* [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12
@ 2026-04-23 15:44 bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 01/18] linux-yocto/6.12: update to v6.12.72 bruce.ashfield
` (18 more replies)
0 siblings, 19 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Hi all,
I know that whinlatter is about to go EOL, but here are the stable
updates I've been tracking for the kernel.
I'll continue to update 6.12 even after whinlatter is no longer
being udpated.
Bruce
openembedded-core (18):
linux-yocto/6.12: update to v6.12.72
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.73
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.74
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.76
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.77
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.79
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.80
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.81
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.83
linux-yocto/6.12: update CVE exclusions
openembedded-core:
meta/recipes-kernel/linux/cve-exclusion_6.12.inc | 1148 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++---------
meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb | 6 +-
meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb | 6 +-
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++---
4 files changed, 1127 insertions(+), 61 deletions(-)
--
2.43.0
^ permalink raw reply [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 01/18] linux-yocto/6.12: update to v6.12.72
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
@ 2026-04-23 15:44 ` bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 02/18] linux-yocto/6.12: update CVE exclusions (6.12.72) bruce.ashfield
` (17 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/6.12 to the latest korg -stable release that comprises
the following commits:
19b3cac2b50b5 Linux 6.12.72
2211d77892913 gpio: omap: do not register driver in probe()
5d810ba377edd wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add
d9af3cf58bb4c PCI: endpoint: Avoid creating sub-groups asynchronously
1d411278dda29 xfs: fix UAF in xchk_btree_check_block_owner
ae385826840a3 erofs: fix UAF issue for file-backed mounts w/ directio option
51223bdd0f60b mptcp: fix race in mptcp_pm_nl_flush_addrs_doit()
9bef8beef1557 bus: mhi: host: pci_generic: Add Telit FE990B40 modem support
2a6bfa97d4d52 scsi: qla2xxx: Query FW again before proceeding with login
05fcd590e5fbb scsi: qla2xxx: Free sp in error path to fix system crash
d70f71d4c92bc scsi: qla2xxx: Delay module unload while fabric scan in progress
387c26bf60042 scsi: qla2xxx: Allow recovery for tape devices
40ae93668226b scsi: qla2xxx: Validate sp before freeing associated memory
7d31dde1bd867 wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()
ea2278657ad0d nilfs2: Fix potential block overflow that cause system hang
687e1d4af79c3 crypto: virtio - Remove duplicated virtqueue_kick in virtio_crypto_skcipher_crypt_req
c0a0ded3bb7fd crypto: virtio - Add spinlock protection with virtqueue notification
c184341920ed7 crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly
1ff337fc7cefe crypto: octeontx - Fix length check to avoid truncation in ucode_load_store
c77b33b585127 crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode
52b6e7417ff76 Bluetooth: btusb: Add USB ID 7392:e611 for Edimax EW-7611UXB
cd0e0a76e40c2 driver core: enforce device_lock for driver_match_device()
baf664fc90a61 smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()
f7b1c2f5642bb ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths
3eaa22d688311 smb: client: split cached_fid bitfields to avoid shared-byte RMW races
ae591174b1f2e Linux 6.12.71
aa9f6f353bcc3 vsock/test: verify socket options after setting them
ceab30fec9ed2 io_uring/rw: recycle buffers manually for non-mshot reads
4ce768ac429ec net: tunnel: make skb_vlan_inet_prepare() return drop reasons
88969c951665e Linux 6.12.70
c1ae8301551f3 gpiolib-acpi: Update file references in the Documentation and MAINTAINERS
833a9452f59f4 ALSA: hda/realtek: Really fix headset mic for TongFang X6AR55xU.
6d6b23aada49c spi: tegra114: Preserve SPI mode bits in def_command1_reg
075415ae18b5b spi: tegra: Fix a memory leak in tegra_slink_probe()
947e6c7ba1578 spi: tegra210-quad: Protect curr_xfer clearing in tegra_qspi_non_combined_seq_xfer
6fd446178a610 spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer
f5a8a27e6eea4 spi: tegra210-quad: Protect curr_xfer assignment in tegra_qspi_setup_transfer_one
62059d8ac0acf spi: tegra210-quad: Move curr_xfer read inside spinlock
69079e7b26d55 spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed transfer
c9c14d2abe4c5 ASoC: amd: fix memory leak in acp3x pdm dma ops
ae0aad8c49df8 ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update()
d8143c54ceeba ipv6: Fix ECMP sibling count mismatch when clearing RTF_ADDRCONF
1444ff890b465 netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()
09dc5be323d4f hwmon: (occ) Mark occ_init_attribute() as __printf
c0de1cc6a6943 drm/xe/pm: Disable D3Cold for BMG only on specific platforms
c8a5ec95c9616 drm/xe/pm: Also avoid missing outer rpm warning on system suspend
422f646b4ab50 drm/xe/query: Fix topology query pointer advance
1aacebe9d4ccb drm/mgag200: fix mgag200_bmc_stop_scanout()
b83557bc6f560 net: gro: fix outer network offset
642c8a50df4c7 net: ethernet: adi: adin1110: Check return value of devm_gpiod_get_optional() in adin1110_check_spi()
d4d5d152d94f6 drm/amd/display: fix wrong color value mapping on MCM shaper LUT
5003e92af2b90 tipc: use kfree_sensitive() for session key material
73585e603dee8 net: don't touch dev->stats in BPF redirect paths
61c8091b7937f net: usb: r8152: fix resume reset deadlock
986967a162142 macvlan: fix error recovery in macvlan_common_newlink()
4a15468051d2c net: sfp: Fix quirk for Ubiquiti U-Fiber Instant SFP module
d8f3c5b5543cf net: sfp: convert sfp quirks to modify struct sfp_module_support
248c29a4d3e47 net: sfp: pre-parse the module support
ecd57017429e3 net: phy: add phy_interface_copy()
4dc7b69bca8ef net: phy: add phy_interface_weight()
2447edc367800 dpaa2-switch: add bounds check for if_id in IRQ handler
52b19b3a22306 net: liquidio: Fix off-by-one error in VF setup_nic_devices() cleanup
f86bd16280a0f net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup
1d4590fde856c net: liquidio: Initialize netdev pointer before queue setup
4acc40db06ffd dpaa2-switch: prevent ZERO_SIZE_PTR dereference when num_ifs is zero
e41a23e61259f net/sched: cls_u32: use skb_header_pointer_careful()
8b6c7f1476646 net: add skb_header_pointer_careful() helper
b64e3b5d8d759 smb/client: fix memory leak in smb2_open_file()
2b5e6819ff7ee platform/x86/intel/tpmi/plr: Make the file domain<n>/status writeable
bd3ecd6018cb5 platform/x86: hp-bioscfg: Skip empty attribute names
177f8c06e879f platform/x86: intel_telemetry: Fix PSS event register mask
bf0474356875d platform/x86: toshiba_haps: Fix memory leaks in add/remove routines
071982199b47a ALSA: hda/realtek: ALC269 fixup for Lenovo Yoga Book 9i 13IRU8 audio
a928eecf030a9 btrfs: reject new transactions if the fs is fully read-only
586c628c0bdd8 wifi: mac80211: don't increment crypto_tx_tailroom_needed_cnt twice
29443629fe745 wifi: mac80211: correctly check if CSA is active
48fe983e92de2 scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()
2901d799a26d9 ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU
41b86a9ec037b scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()
30f1507376d6e wifi: cfg80211: Fix bitrate calculation overflow for HE rates
811b45e2d795d regmap: maple: free entry on mas_store_gfp() failure
70b24ad9d84a9 spi: hisi-kunpeng: Fixed the wrong debugfs node name in hisi_spi debugfs initialization
58df2eca707c2 ASoC: tlv320adcx140: Propagate error codes during probe
1c1c8fafa0b91 ASoC: amd: yc: Fix microphone on ASUS M6500RE
6e0c7503a5803 nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()
fa301aef50e3f nvme-fc: release admin tagset if init fails
1d5c634789492 ASoC: simple-card-utils: Check device node before overwrite direction
e07de198dbcca ASoC: davinci-evm: Fix reference leak in davinci_evm_probe
66a7153fd67c8 wifi: mac80211: collect station statistics earlier when disconnect
95d2a20ae6873 HID: logitech: add HID++ support for Logitech MX Anywhere 3S
4cd8f9799981b ring-buffer: Avoid softlockup in ring_buffer_resize() during memory free
c1853ebbec980 drm/amd/pm: Disable MMIO access during SMU Mode 1 reset
ff8a020151798 HID: Apply quirk HID_QUIRK_ALWAYS_POLL to Edifier QR30 (2d99:a101)
786ec171788bd HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()
81a074334c01f HID: quirks: Add another Chicony HP 5MP Cameras to hid_ignore_list
3521db9fcbd22 netfilter: replace -EEXIST with -EBUSY
beb54a7f9c674 PCI: qcom: Remove ASPM L0s support for MSM8996 SoC
dc60a7d2dc78b ALSA: hda/realtek: add HP Laptop 15s-eq1xxx mute LED quirk
04818a914fdce ALSA: hda/realtek: Add quirk for Acer Nitro AN517-55
cba4664a19f5a HID: playstation: Center initial joystick axes to prevent spurious events
40c3f16aa7235 HID: intel-ish-hid: Reset enum_devices_done before enumeration
c45848936ebdb riscv: Sanitize syscall table indexing under speculation
f3ee1732851ae btrfs: fix reservation leak in some error paths when inserting inline extent
626f39c9c8ed3 HID: multitouch: add MT_QUIRK_STICKY_FINGERS to MT_CLS_VTL
367ec17610106 HID: intel-ish-hid: Update ishtp bus match to support device ID table
8a15107c4c031 smb/server: fix refcount leak in parse_durable_handle_context()
c49a28068363f LoongArch: Enable exception fixup for specific ADE subcode
39ca11ff158c9 smb/server: fix refcount leak in smb2_open()
165d1359f945b md: suspend array while updating raid_disks via sysfs
380d7c1af4bd3 LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED
ac18761b530b5 smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe()
5fa0faf0e4d08 block,bfq: fix aux stat accumulation destination
e297a64beff9f net: usb: sr9700: support devices with virtual driver CD
71de0b6e04bbe wifi: wlcore: ensure skb headroom before skb_push
536447521b3b9 wifi: mac80211: ocb: skip rx_no_sta when interface is not joined
76d035271e120 tracing: Fix ftrace event field alignments
b9b97e6aeb534 procfs: avoid fetching build ID while holding VMA lock
87ff11143615c KVM: selftests: Add -U_FORTIFY_SOURCE to avoid some unpredictable test failures
ee5e42e9a59ac binderfs: fix ida_alloc_max() upper bound
9eec6f49d3fae binder: fix BR_FROZEN_REPLY error log
5b5228964619b hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
9bcc47343ee0e ublk: fix deadlock when reading partition table
d288ba832d92d tools/power turbostat: fix GCC9 build regression
58130e7ce6cb6 PCI/ERR: Ensure error recoverability at all times
ff48c9312d042 KVM: Don't clobber irqfd routing type when deassigning irqfd
5b794951541e8 Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem"
dfc3ab6bd6486 mm, shmem: prevent infinite loop on truncate race
fe787920fac00 gve: Correct ethtool rx_dropped calculation
9fa0a755db3e1 gve: Fix stats report corruption on queue count change
8c9af7339de41 ceph: fix oops due to invalid pointer for kfree() in parse_longname()
60645e27e3ec6 ARM: 9468/1: fix memset64() on big-endian
41ededf7ef153 rbd: check for EOD after exclusive lock is ensured to be held
c6f8326f26bd2 ceph: fix NULL pointer dereference in ceph_mds_auth_match()
b8bc72587c79f mm/slab: Add alloc_tagging_slab_free_hook for memcg_alloc_abort_single
4390dcdabb5fc pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc->domains
e142106ee355e pmdomain: imx8mp-blk-ctrl: Keep usb phy power domain on for system wakeup
b8ea101959ab1 pmdomain: imx: gpcv2: Fix the imx8mm gpu hang due to wrong adb400 reset
fb14cb9a1cd69 pmdomain: imx8mp-blk-ctrl: Keep gpc power domain on for system wakeup
ab99415e30f22 pmdomain: qcom: rpmpd: fix off-by-one error in clamping to the highest state
bad15420050db ALSA: aloop: Fix racy access at PCM trigger
e6ff2ebff427b platform/x86: intel_telemetry: Fix swapped arrays in PSS output
917ccf6fd180a x86/kfence: fix booting on 32bit non-PAE systems
2f467a92df61e x86/vmware: Fix hypercall clobbers
19672ae68d52f nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/linux-yocto-rt_6.12.bb | 6 ++--
.../linux/linux-yocto-tiny_6.12.bb | 6 ++--
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++----------
3 files changed, 20 insertions(+), 20 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
index 5816902a7f..0f21f2e4d5 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
@@ -15,13 +15,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "35d6569f165579f64f76cbdfd1feb41a2b5359ec"
-SRCREV_meta ?= "5b1ff7df002df6e7069a53b361d9e8f5f9df3aac"
+SRCREV_machine ?= "6adb3759af2b8904cab35fdb1b40c12e17e313c1"
+SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
-LINUX_VERSION ?= "6.12.69"
+LINUX_VERSION ?= "6.12.72"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
index 5828ff986b..7cea4ea4f7 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
@@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc
include recipes-kernel/linux/cve-exclusion.inc
include recipes-kernel/linux/cve-exclusion_6.12.inc
-LINUX_VERSION ?= "6.12.69"
+LINUX_VERSION ?= "6.12.72"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c"
-SRCREV_meta ?= "5b1ff7df002df6e7069a53b361d9e8f5f9df3aac"
+SRCREV_machine ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
+SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755"
PV = "${LINUX_VERSION}+git"
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
index 91b013f498..6f9906fb74 100644
--- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
@@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base"
KBRANCH:qemuloongarch64 ?= "v6.12/standard/base"
KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "4c24c5ab253ea3f46bb578fe43d25877bc269206"
-SRCREV_machine:qemuarm64 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c"
-SRCREV_machine:qemuloongarch64 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c"
-SRCREV_machine:qemumips ?= "377285b4e49c411f89784c6b1c374dbfb634e253"
-SRCREV_machine:qemuppc ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c"
-SRCREV_machine:qemuriscv64 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c"
-SRCREV_machine:qemuriscv32 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c"
-SRCREV_machine:qemux86 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c"
-SRCREV_machine:qemux86-64 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c"
-SRCREV_machine:qemumips64 ?= "f2e77270b007d80acbfc32114e81d1abc411e8b4"
-SRCREV_machine ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c"
-SRCREV_meta ?= "5b1ff7df002df6e7069a53b361d9e8f5f9df3aac"
+SRCREV_machine:qemuarm ?= "c4d3cba9c7fe4e4f7275fdaa50e35d479108813f"
+SRCREV_machine:qemuarm64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
+SRCREV_machine:qemuloongarch64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
+SRCREV_machine:qemumips ?= "e5e61bd34c2ce267b67502f95dd3f11dfdb5c77e"
+SRCREV_machine:qemuppc ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
+SRCREV_machine:qemuriscv64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
+SRCREV_machine:qemuriscv32 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
+SRCREV_machine:qemux86 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
+SRCREV_machine:qemux86-64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
+SRCREV_machine:qemumips64 ?= "482153ceffc764c453274f27e950fee03a0fe17e"
+SRCREV_machine ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
+SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "ff2177382799753070b71747f646963147eabc7c"
+SRCREV_machine:class-devupstream ?= "19b3cac2b50b53cc000b4cd795415c7d03484707"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v6.12/base"
@@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "6.12.69"
+LINUX_VERSION ?= "6.12.72"
PV = "${LINUX_VERSION}+git"
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 02/18] linux-yocto/6.12: update CVE exclusions (6.12.72)
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 01/18] linux-yocto/6.12: update to v6.12.72 bruce.ashfield
@ 2026-04-23 15:44 ` bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 03/18] linux-yocto/6.12: update to v6.12.73 bruce.ashfield
` (16 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 1 changes (0 new | 1 updated): - 0 new CVEs: - 1 updated CVEs: CVE-2025-7195
Date: Mon, 16 Feb 2026 17:05:40 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/cve-exclusion_6.12.inc | 232 +++++++++++++++++-
1 file changed, 225 insertions(+), 7 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index 64477c364e..089446fe87 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2026-02-10 02:33:33.917945+00:00 for kernel version 6.12.69
-# From linux_kernel_cves cve_2026-02-10_0100Z
+# Generated at 2026-02-16 17:20:15.768713+00:00 for kernel version 6.12.72
+# From linux_kernel_cves cve_2026-02-16_1600Z-3-gf0e5d9ffdc0
python check_kernel_cve_status_version() {
- this_version = "6.12.69"
+ this_version = "6.12.72"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -18980,7 +18980,7 @@ CVE_STATUS[CVE-2025-40080] = "cpe-stable-backport: Backported in 6.12.53"
CVE_STATUS[CVE-2025-40081] = "cpe-stable-backport: Backported in 6.12.53"
-CVE_STATUS[CVE-2025-40082] = "fixed-version: only affects 6.17 onwards"
+CVE_STATUS[CVE-2025-40082] = "cpe-stable-backport: Backported in 6.12.70"
CVE_STATUS[CVE-2025-40083] = "cpe-stable-backport: Backported in 6.12.57"
@@ -20066,8 +20066,6 @@ CVE_STATUS[CVE-2025-68787] = "cpe-stable-backport: Backported in 6.12.64"
CVE_STATUS[CVE-2025-68788] = "cpe-stable-backport: Backported in 6.12.64"
-CVE_STATUS[CVE-2025-68789] = "cpe-stable-backport: Backported in 6.12.64"
-
CVE_STATUS[CVE-2025-68790] = "fixed-version: only affects 6.18 onwards"
CVE_STATUS[CVE-2025-68791] = "fixed-version: only affects 6.14 onwards"
@@ -20134,7 +20132,7 @@ CVE_STATUS[CVE-2025-68821] = "cpe-stable-backport: Backported in 6.12.64"
CVE_STATUS[CVE-2025-68822] = "cpe-stable-backport: Backported in 6.12.64"
-# CVE-2025-68823 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2025-68823] = "cpe-stable-backport: Backported in 6.12.70"
CVE_STATUS[CVE-2025-71064] = "cpe-stable-backport: Backported in 6.12.64"
@@ -20376,6 +20374,26 @@ CVE_STATUS[CVE-2025-71198] = "cpe-stable-backport: Backported in 6.12.68"
CVE_STATUS[CVE-2025-71199] = "cpe-stable-backport: Backported in 6.12.68"
+CVE_STATUS[CVE-2025-71200] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2025-71201] = "fixed-version: only affects 6.14 onwards"
+
+# CVE-2025-71202 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-71203] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2025-71204] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2025-71220] = "cpe-stable-backport: Backported in 6.12.70"
+
+# CVE-2025-71221 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-71222] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2025-71223] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2025-71224] = "cpe-stable-backport: Backported in 6.12.70"
+
CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66"
CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66"
@@ -20646,3 +20664,203 @@ CVE_STATUS[CVE-2026-23109] = "fixed-version: only affects 6.16 onwards"
CVE_STATUS[CVE-2026-23110] = "cpe-stable-backport: Backported in 6.12.68"
+CVE_STATUS[CVE-2026-23111] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23112] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23113] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23114] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23115] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-23116] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23117] = "fixed-version: only affects 6.18.2 onwards"
+
+CVE_STATUS[CVE-2026-23118] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23119] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23120] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23121] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23122] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23123] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23124] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23125] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23126] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23127] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23128] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23129] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23130] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23131] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23132] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23133] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23134] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23135] = "cpe-stable-backport: Backported in 6.12.68"
+
+CVE_STATUS[CVE-2026-23136] = "cpe-stable-backport: Backported in 6.12.66"
+
+# CVE-2026-23137 needs backporting (fixed from 6.19)
+
+# CVE-2026-23138 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-23139] = "cpe-stable-backport: Backported in 6.12.66"
+
+CVE_STATUS[CVE-2026-23140] = "cpe-stable-backport: Backported in 6.12.66"
+
+CVE_STATUS[CVE-2026-23141] = "cpe-stable-backport: Backported in 6.12.67"
+
+CVE_STATUS[CVE-2026-23142] = "cpe-stable-backport: Backported in 6.12.67"
+
+CVE_STATUS[CVE-2026-23143] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-23144] = "cpe-stable-backport: Backported in 6.12.67"
+
+CVE_STATUS[CVE-2026-23145] = "cpe-stable-backport: Backported in 6.12.67"
+
+CVE_STATUS[CVE-2026-23146] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23147] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-23148] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23149] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23150] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23151] = "cpe-stable-backport: Backported in 6.12.69"
+
+# CVE-2026-23152 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-23153] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23154] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23155] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23156] = "cpe-stable-backport: Backported in 6.12.69"
+
+# CVE-2026-23157 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-23158] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23159] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23160] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23161] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23162] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23163] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23164] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23165] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23166] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23167] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23168] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23169] = "cpe-stable-backport: Backported in 6.12.72"
+
+CVE_STATUS[CVE-2026-23170] = "cpe-stable-backport: Backported in 6.12.69"
+
+# CVE-2026-23171 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-23172] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23173] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23174] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23175] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23176] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23177] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23178] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23179] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23180] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23181] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-23182] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23183] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23184] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23185] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23186] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-23187] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23188] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23189] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23190] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23191] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23192] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-23193] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23194] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23195] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23196] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23197] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23198] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23199] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23200] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23201] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23202] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23203] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23204] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23205] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23206] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23207] = "fixed-version: only affects 6.18.2 onwards"
+
+# CVE-2026-23208 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-23209] = "cpe-stable-backport: Backported in 6.12.70"
+
+# CVE-2026-23210 needs backporting (fixed from 6.19)
+
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 03/18] linux-yocto/6.12: update to v6.12.73
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 01/18] linux-yocto/6.12: update to v6.12.72 bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 02/18] linux-yocto/6.12: update CVE exclusions (6.12.72) bruce.ashfield
@ 2026-04-23 15:44 ` bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 04/18] linux-yocto/6.12: update CVE exclusions (6.12.73) bruce.ashfield
` (15 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/6.12 to the latest korg -stable release that comprises
the following commits:
5fb0303f6cb6a Linux 6.12.73
a7fa9460b86f8 Revert "driver core: enforce device_lock for driver_match_device()"
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/linux-yocto-rt_6.12.bb | 6 ++--
.../linux/linux-yocto-tiny_6.12.bb | 6 ++--
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++----------
3 files changed, 20 insertions(+), 20 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
index 0f21f2e4d5..4572915cf4 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
@@ -15,13 +15,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "6adb3759af2b8904cab35fdb1b40c12e17e313c1"
-SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755"
+SRCREV_machine ?= "1be6d1eaceba0860348c41af8951ccebfa5aa2c8"
+SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
-LINUX_VERSION ?= "6.12.72"
+LINUX_VERSION ?= "6.12.73"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
index 7cea4ea4f7..d5c1c8c052 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
@@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc
include recipes-kernel/linux/cve-exclusion.inc
include recipes-kernel/linux/cve-exclusion_6.12.inc
-LINUX_VERSION ?= "6.12.72"
+LINUX_VERSION ?= "6.12.73"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
-SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755"
+SRCREV_machine ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
+SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356"
PV = "${LINUX_VERSION}+git"
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
index 6f9906fb74..5b6bf7ef0a 100644
--- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
@@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base"
KBRANCH:qemuloongarch64 ?= "v6.12/standard/base"
KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "c4d3cba9c7fe4e4f7275fdaa50e35d479108813f"
-SRCREV_machine:qemuarm64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
-SRCREV_machine:qemuloongarch64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
-SRCREV_machine:qemumips ?= "e5e61bd34c2ce267b67502f95dd3f11dfdb5c77e"
-SRCREV_machine:qemuppc ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
-SRCREV_machine:qemuriscv64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
-SRCREV_machine:qemuriscv32 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
-SRCREV_machine:qemux86 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
-SRCREV_machine:qemux86-64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
-SRCREV_machine:qemumips64 ?= "482153ceffc764c453274f27e950fee03a0fe17e"
-SRCREV_machine ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172"
-SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755"
+SRCREV_machine:qemuarm ?= "a7cf22192ce38f303c8a5070b750583953a34e09"
+SRCREV_machine:qemuarm64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
+SRCREV_machine:qemuloongarch64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
+SRCREV_machine:qemumips ?= "9a4ed79b88cab20c169656abe310068f8cdab2c3"
+SRCREV_machine:qemuppc ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
+SRCREV_machine:qemuriscv64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
+SRCREV_machine:qemuriscv32 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
+SRCREV_machine:qemux86 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
+SRCREV_machine:qemux86-64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
+SRCREV_machine:qemumips64 ?= "0a68bc37afffea25aa627239d1de74f4b7088824"
+SRCREV_machine ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
+SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "19b3cac2b50b53cc000b4cd795415c7d03484707"
+SRCREV_machine:class-devupstream ?= "5fb0303f6cb6a89bcfb19bd7a68cb793c86e78b2"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v6.12/base"
@@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "6.12.72"
+LINUX_VERSION ?= "6.12.73"
PV = "${LINUX_VERSION}+git"
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 04/18] linux-yocto/6.12: update CVE exclusions (6.12.73)
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (2 preceding siblings ...)
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 03/18] linux-yocto/6.12: update to v6.12.73 bruce.ashfield
@ 2026-04-23 15:44 ` bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 05/18] linux-yocto/6.12: update to v6.12.74 bruce.ashfield
` (14 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 9 changes (3 new | 6 updated): - 3 new CVEs: CVE-2026-0874, CVE-2026-0875, CVE-2026-23491 - 6 updated CVEs: CVE-2025-13601, CVE-2025-70062, CVE-2025-70063, CVE-2025-7195, CVE-2026-25500, CVE-2026-2661
Date: Wed, 18 Feb 2026 19:58:22 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/cve-exclusion_6.12.inc | 72 ++++++++++++++++++-
1 file changed, 69 insertions(+), 3 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index 089446fe87..92a12f2c1f 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2026-02-16 17:20:15.768713+00:00 for kernel version 6.12.72
-# From linux_kernel_cves cve_2026-02-16_1600Z-3-gf0e5d9ffdc0
+# Generated at 2026-02-18 20:12:59.836870+00:00 for kernel version 6.12.73
+# From linux_kernel_cves cve_2026-02-18_1900Z-2-ge0bc67e5ce4
python check_kernel_cve_status_version() {
- this_version = "6.12.72"
+ this_version = "6.12.73"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -20394,6 +20394,32 @@ CVE_STATUS[CVE-2025-71223] = "cpe-stable-backport: Backported in 6.12.70"
CVE_STATUS[CVE-2025-71224] = "cpe-stable-backport: Backported in 6.12.70"
+CVE_STATUS[CVE-2025-71225] = "cpe-stable-backport: Backported in 6.12.70"
+
+# CVE-2025-71226 needs backporting (fixed from 6.19)
+
+# CVE-2025-71227 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-71228] = "cpe-stable-backport: Backported in 6.12.70"
+
+# CVE-2025-71229 has no known resolution
+
+# CVE-2025-71230 has no known resolution
+
+# CVE-2025-71231 has no known resolution
+
+# CVE-2025-71232 has no known resolution
+
+# CVE-2025-71233 has no known resolution
+
+# CVE-2025-71234 has no known resolution
+
+# CVE-2025-71235 has no known resolution
+
+# CVE-2025-71236 has no known resolution
+
+# CVE-2025-71237 has no known resolution
+
CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66"
CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66"
@@ -20864,3 +20890,43 @@ CVE_STATUS[CVE-2026-23209] = "cpe-stable-backport: Backported in 6.12.70"
# CVE-2026-23210 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2026-23211] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23212] = "cpe-stable-backport: Backported in 6.12.69"
+
+CVE_STATUS[CVE-2026-23213] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23214] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23215] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23216] = "cpe-stable-backport: Backported in 6.12.70"
+
+# CVE-2026-23217 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-23218] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23219] = "cpe-stable-backport: Backported in 6.12.70"
+
+# CVE-2026-23220 has no known resolution
+
+# CVE-2026-23221 has no known resolution
+
+# CVE-2026-23222 has no known resolution
+
+# CVE-2026-23223 has no known resolution
+
+# CVE-2026-23224 has no known resolution
+
+# CVE-2026-23225 has no known resolution
+
+# CVE-2026-23226 has no known resolution
+
+# CVE-2026-23227 has no known resolution
+
+# CVE-2026-23228 has no known resolution
+
+# CVE-2026-23229 has no known resolution
+
+# CVE-2026-23230 has no known resolution
+
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 05/18] linux-yocto/6.12: update to v6.12.74
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (3 preceding siblings ...)
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 04/18] linux-yocto/6.12: update CVE exclusions (6.12.73) bruce.ashfield
@ 2026-04-23 15:44 ` bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 06/18] linux-yocto/6.12: update CVE exclusions (6.12.74) bruce.ashfield
` (13 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/6.12 to the latest korg -stable release that comprises
the following commits:
444b39ef6108 Linux 6.12.74
9001c6815e53 USB: serial: option: add Telit FN920C04 RNDIS compositions
962c167b0f26 f2fs: fix IS_CHECKPOINTED flag inconsistency issue caused by concurrent atomic commit and checkpoint writes
cf4a9e1bc812 f2fs: fix to avoid UAF in f2fs_write_end_io()
121f787e740d iommu/arm-smmu-qcom: do not register driver in probe()
1ff415eef513 f2fs: fix to avoid mapping wrong physical block for swapfile
4ef30b9f1641 f2fs: fix out-of-bounds access in sysfs attribute read/write
b72d775424f5 f2fs: fix to check sysfs filename w/ gc_pin_file_thresh correctly
aeb70609e6b5 f2fs: fix to add gc count stat in f2fs_gc_range
52917e265aa5 fbdev: smscufx: properly copy ioctl memory to kernelspace
9efa0dc46270 fbdev: rivafb: fix divide error in nv3_arb()
7b7829839dac cpuset: Fix missing adaptation for cpuset_is_populated
e94b369ff82f Revert "wireguard: device: enable threaded NAPI"
56db97af7c89 LoongArch: Rework KASAN initialization for PTW-enabled systems
da06bb0ca45b mm/hugetlb: fix excessive IPI broadcasts when unsharing PMD tables using mmu_gather
baa198a93401 mm/hugetlb: fix two comments related to huge_pmd_unshare()
3a18b452dd5f mm/hugetlb: fix hugetlb_pmd_shared()
b285b1fd51fa mm/hugetlb: fix copy_hugetlb_page_range() to use ->pt_share_count
56ef68a5b8a1 gpiolib: acpi: Fix gpio count with string references
daaf4fe333e0 ASoC: fsl_xcvr: fix missing lock in fsl_xcvr_mode_put()
67484f35c447 drm/amd/display: remove assert around dpp_base replacement
7165dc5133fb drm/amd/display: extend delta clamping logic to CM3 LUT helper
02d209bb018a tracing/dma: Cap dma_map_sg tracepoint arrays to prevent buffer overflow
ded6043c3358 ASoC: cs42l43: Correct handling of 3-pole jack load detection
b3851fb4aba8 platform/x86: panasonic-laptop: Fix sysfs group leak in error path
bc3da98445cf platform/x86/amd/pmc: Add quirk for MECHREVO Wujie 15X Pro
db8799e80cb7 ALSA: hda/realtek: Enable headset mic for Acer Nitro 5
c9575a0cd571 ASoC: amd: yc: Add quirk for HP 200 G2a 16
a1ad7bbeafd7 ASoC: Intel: sof_es8336: Add DMI quirk for Huawei BOD-WXX9
da6e06a5fdba platform/x86: classmate-laptop: Add missing NULL pointer checks
45668b63be01 drm/tegra: hdmi: sor: Fix error: variable ‘j’ set but not used
9b203b8ddd73 romfs: check sb_set_blocksize() return value
59ec2c61fe03 ALSA: hda/realtek - fixed speaker no sound
10a948cb71d1 ASoC: cs35l45: Corrects ASP_TX5 DAPM widget channel
284ded9e5b72 ALSA: hda/realtek: Add quirk for Inspur S14-G1
5beb4ddac6a9 gpio: sprd: Change sprd_gpio lock to raw_spin_lock
8a6e19a406d8 ASoC: amd: yc: Add ASUS ExpertBook PM1503CDA to quirks list
209d027747cb ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU
dd8ba8c0c3f3 bus: fsl-mc: fix use-after-free in driver_override_show()
b7a5b454b7f7 bus: fsl-mc: Replace snprintf and sprintf with sysfs_emit in sysfs show functions
a22fe7581f11 bnxt_en: hide CONFIG_DETECT_HUNG_TASK specific code
7096cc734240 bnxt_en: Change FW message timeout warning
871f6236da96 scsi: qla2xxx: Fix bsg_done() causing double free
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/linux-yocto-rt_6.12.bb | 6 ++--
.../linux/linux-yocto-tiny_6.12.bb | 6 ++--
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++----------
3 files changed, 20 insertions(+), 20 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
index 4572915cf4..a8d17a5c14 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
@@ -15,13 +15,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "1be6d1eaceba0860348c41af8951ccebfa5aa2c8"
-SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356"
+SRCREV_machine ?= "96b72162b68a3a6084945ef4bf357a3de5c196ed"
+SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
-LINUX_VERSION ?= "6.12.73"
+LINUX_VERSION ?= "6.12.74"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
index d5c1c8c052..22b15e69f2 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
@@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc
include recipes-kernel/linux/cve-exclusion.inc
include recipes-kernel/linux/cve-exclusion_6.12.inc
-LINUX_VERSION ?= "6.12.73"
+LINUX_VERSION ?= "6.12.74"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
-SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356"
+SRCREV_machine ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
+SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699"
PV = "${LINUX_VERSION}+git"
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
index 5b6bf7ef0a..92807f9057 100644
--- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
@@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base"
KBRANCH:qemuloongarch64 ?= "v6.12/standard/base"
KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "a7cf22192ce38f303c8a5070b750583953a34e09"
-SRCREV_machine:qemuarm64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
-SRCREV_machine:qemuloongarch64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
-SRCREV_machine:qemumips ?= "9a4ed79b88cab20c169656abe310068f8cdab2c3"
-SRCREV_machine:qemuppc ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
-SRCREV_machine:qemuriscv64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
-SRCREV_machine:qemuriscv32 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
-SRCREV_machine:qemux86 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
-SRCREV_machine:qemux86-64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
-SRCREV_machine:qemumips64 ?= "0a68bc37afffea25aa627239d1de74f4b7088824"
-SRCREV_machine ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de"
-SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356"
+SRCREV_machine:qemuarm ?= "f4b46d6d3a4e38d532c5e11866d3d071ae398f16"
+SRCREV_machine:qemuarm64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
+SRCREV_machine:qemuloongarch64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
+SRCREV_machine:qemumips ?= "da8487babd144628f801a204696523e077829fa2"
+SRCREV_machine:qemuppc ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
+SRCREV_machine:qemuriscv64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
+SRCREV_machine:qemuriscv32 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
+SRCREV_machine:qemux86 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
+SRCREV_machine:qemux86-64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
+SRCREV_machine:qemumips64 ?= "29ca2370cd8722cc5fd712f4a6b4757ad84fde3e"
+SRCREV_machine ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
+SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "5fb0303f6cb6a89bcfb19bd7a68cb793c86e78b2"
+SRCREV_machine:class-devupstream ?= "444b39ef6108313e8452010b22aaba588e8fb92b"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v6.12/base"
@@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "6.12.73"
+LINUX_VERSION ?= "6.12.74"
PV = "${LINUX_VERSION}+git"
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 06/18] linux-yocto/6.12: update CVE exclusions (6.12.74)
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (4 preceding siblings ...)
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 05/18] linux-yocto/6.12: update to v6.12.74 bruce.ashfield
@ 2026-04-23 15:44 ` bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 07/18] linux-yocto/6.12: update to v6.12.76 bruce.ashfield
` (12 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 1 changes (1 new | 0 updated): - 1 new CVEs: CVE-2026-2971 - 0 updated CVEs:
Date: Mon, 23 Feb 2026 04:58:05 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/cve-exclusion_6.12.inc | 48 +++++++++----------
1 file changed, 24 insertions(+), 24 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index 92a12f2c1f..c7726e1306 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2026-02-18 20:12:59.836870+00:00 for kernel version 6.12.73
-# From linux_kernel_cves cve_2026-02-18_1900Z-2-ge0bc67e5ce4
+# Generated at 2026-02-23 05:12:32.087151+00:00 for kernel version 6.12.74
+# From linux_kernel_cves cve_2026-02-23_0400Z-1-g3cbc7410733
python check_kernel_cve_status_version() {
- this_version = "6.12.73"
+ this_version = "6.12.74"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -20402,23 +20402,23 @@ CVE_STATUS[CVE-2025-71225] = "cpe-stable-backport: Backported in 6.12.70"
CVE_STATUS[CVE-2025-71228] = "cpe-stable-backport: Backported in 6.12.70"
-# CVE-2025-71229 has no known resolution
+CVE_STATUS[CVE-2025-71229] = "cpe-stable-backport: Backported in 6.12.72"
-# CVE-2025-71230 has no known resolution
+CVE_STATUS[CVE-2025-71230] = "fixed-version: only affects 6.13 onwards"
-# CVE-2025-71231 has no known resolution
+CVE_STATUS[CVE-2025-71231] = "cpe-stable-backport: Backported in 6.12.72"
-# CVE-2025-71232 has no known resolution
+CVE_STATUS[CVE-2025-71232] = "cpe-stable-backport: Backported in 6.12.72"
-# CVE-2025-71233 has no known resolution
+CVE_STATUS[CVE-2025-71233] = "cpe-stable-backport: Backported in 6.12.72"
-# CVE-2025-71234 has no known resolution
+CVE_STATUS[CVE-2025-71234] = "cpe-stable-backport: Backported in 6.12.72"
-# CVE-2025-71235 has no known resolution
+CVE_STATUS[CVE-2025-71235] = "cpe-stable-backport: Backported in 6.12.72"
-# CVE-2025-71236 has no known resolution
+CVE_STATUS[CVE-2025-71236] = "cpe-stable-backport: Backported in 6.12.72"
-# CVE-2025-71237 has no known resolution
+CVE_STATUS[CVE-2025-71237] = "cpe-stable-backport: Backported in 6.12.72"
CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66"
@@ -20668,7 +20668,7 @@ CVE_STATUS[CVE-2026-23098] = "cpe-stable-backport: Backported in 6.12.68"
CVE_STATUS[CVE-2026-23099] = "cpe-stable-backport: Backported in 6.12.68"
-CVE_STATUS[CVE-2026-23100] = "fixed-version: only affects 6.13 onwards"
+CVE_STATUS[CVE-2026-23100] = "cpe-stable-backport: Backported in 6.12.74"
CVE_STATUS[CVE-2026-23101] = "cpe-stable-backport: Backported in 6.12.68"
@@ -20908,25 +20908,25 @@ CVE_STATUS[CVE-2026-23218] = "fixed-version: only affects 6.18 onwards"
CVE_STATUS[CVE-2026-23219] = "cpe-stable-backport: Backported in 6.12.70"
-# CVE-2026-23220 has no known resolution
+CVE_STATUS[CVE-2026-23220] = "cpe-stable-backport: Backported in 6.12.72"
-# CVE-2026-23221 has no known resolution
+CVE_STATUS[CVE-2026-23221] = "cpe-stable-backport: Backported in 6.12.74"
-# CVE-2026-23222 has no known resolution
+CVE_STATUS[CVE-2026-23222] = "cpe-stable-backport: Backported in 6.12.72"
-# CVE-2026-23223 has no known resolution
+CVE_STATUS[CVE-2026-23223] = "cpe-stable-backport: Backported in 6.12.72"
-# CVE-2026-23224 has no known resolution
+CVE_STATUS[CVE-2026-23224] = "cpe-stable-backport: Backported in 6.12.72"
-# CVE-2026-23225 has no known resolution
+CVE_STATUS[CVE-2026-23225] = "fixed-version: only affects 6.19 onwards"
-# CVE-2026-23226 has no known resolution
+# CVE-2026-23226 needs backporting (fixed from 7.0rc1)
-# CVE-2026-23227 has no known resolution
+# CVE-2026-23227 needs backporting (fixed from 7.0rc1)
-# CVE-2026-23228 has no known resolution
+CVE_STATUS[CVE-2026-23228] = "cpe-stable-backport: Backported in 6.12.72"
-# CVE-2026-23229 has no known resolution
+CVE_STATUS[CVE-2026-23229] = "cpe-stable-backport: Backported in 6.12.72"
-# CVE-2026-23230 has no known resolution
+CVE_STATUS[CVE-2026-23230] = "cpe-stable-backport: Backported in 6.12.72"
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 07/18] linux-yocto/6.12: update to v6.12.76
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (5 preceding siblings ...)
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 06/18] linux-yocto/6.12: update CVE exclusions (6.12.74) bruce.ashfield
@ 2026-04-23 15:44 ` bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 08/18] linux-yocto/6.12: update CVE exclusions (6.12.76) bruce.ashfield
` (11 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/6.12 to the latest korg -stable release that comprises
the following commits:
39b686f8d57d Linux 6.12.76
412c9b54585c Revert "x86/kexec: add a sanity check on previous kernel's ima kexec buffer"
c1924e059c72 Linux 6.12.75
bbfe49ffb892 most: core: fix leak on early registration failure
9f3ffd49da12 arm64: Fix sampling the "stable" virtual counter in preemptible section
1147ab1336bc xfs: fix copy-paste error in previous fix
c2bc05dc5ff2 drm/i915/wakeref: clean up INTEL_WAKEREF_PUT_* flag macros
5af4761d11a7 ALSA: pcm: Revert bufs move in snd_pcm_xfern_frames_ioctl()
26034b60d806 NTB: ntb_transport: Fix too small buffer for debugfs_name
af45c677dbf9 tracing: Wake up poll waiters for hist files when removing an event
588c08026d6a tracing: Fix checking of freed trace_event_file for hist files
fea7c9a23c0f fgraph: Do not call handlers direct when not using ftrace_ops
b4700c089a10 tracing: ring-buffer: Fix to check event length before using
3b91160e9a91 net: nfc: nci: Fix parameter validation for packet data
bd135851106c drm/amdgpu: keep vga memory on MacBooks with switchable graphics
5fc0933641a8 arm64: Force the use of CNTVCT_EL0 in __delay()
d95f0851cf40 x86/kexec: Copy ACPI root pointer address from config table
015cebdfcb97 net/sched: act_skbedit: fix divide-by-zero in tcf_skbedit_hash()
1b1371cd4032 net: ethernet: ec_bhf: Fix dma_free_coherent() dma handle
8122e05bd27b ASoC: amd: yc: Add DMI quirk for ASUS Vivobook Pro 15X M6501RR
1d731e512134 cifs: some missing initializations on replay
f73b3653a4c3 fbcon: Remove struct fbcon_display.inverse
8225baf882d5 fbdev: ffb: fix corrupted video output on Sun FFB1
d6f34bbff074 fbdev: of: display_timing: fix refcount leak in of_get_display_timings()
f47d5b9e8aa6 fbdev: vt8500lcdfb: fix missing dma_free_coherent()
0b038c0be682 fbcon: check return value of con2fb_acquire_newinfo()
e93d898ee997 mm: numa_memblks: Identify the accurate NUMA ID of CFMW
0591d6509c2f ipv6: ioam: fix heap buffer overflow in __ioam6_fill_trace_data()
91892dafccb1 function_graph: Restore direct mode when callbacks drop to one
97900f512252 atm: fore200e: fix use-after-free in tasklets during device removal
df4308cb52dc net: intel: fix PCI device ID conflict between i40e and ipw2200
f9fe092084cd procfs: fix possible double mmput() in do_procmap_query()
82a7ea35a152 drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify
8f08df326752 drm/amd/display: Increase DCN35 SR enter/exit latency
5cfc202825ba io_uring/filetable: clamp alloc_hint to the configured alloc range
74f7e464ad88 tracing: Fix to set write permission to per-cpu buffer_size_kb
6e704e89f16f net: macb: Fix tx/rx malfunction after phy link down and up
86ad5c4ac790 net: ti: icssg-prueth: Add optional dependency on HSR
ccef79af58b4 octeontx2-af: CGX: fix bitmap leaks
84b932bc9899 net: wan/fsl_ucc_hdlc: Fix dma_free_coherent() in uhdlc_memclean()
f73c042724d9 net: ethernet: marvell: skge: remove incorrect conflicting PCI ID
e6e65be0752f LoongArch: Disable instrumentation for setup_ptwalker()
35a384eb064e LoongArch: Guard percpu handler under !CONFIG_PREEMPT_RT
808ac152e46a LoongArch: Use %px to print unmodified unwinding address
af7db33e5d2e LoongArch: Prefer top-down allocation after arch_mem_init()
92adfb707bee LoongArch: Make cpumask_of_node() robust against NUMA_NO_NODE
4f5b7016e552 rust: kbuild: pass `-Zunstable-options` for Rust 1.95.0
531a76c5a2e4 ceph: supply snapshot context in ceph_zero_partial_object()
e7d70a77ad6f MIPS: rb532: Fix MMIO UART resource registration
601dd3b79769 cifs: Fix locking usage for tcon fields
7d9e0df82207 watchdog/softlockup: fix sample ring index wrap in need_counting_irqs()
3713af7e95a3 kcsan, compiler_types: avoid duplicate type issues in BPF Type Format
04d24a3654ed staging: rtl8723bs: fix null dereference in find_network
6d2dae6b97bd parisc: kernel: replace kfree() with put_device() in create_tree_node()
0425aaf20b40 PCI: Fix pci_slot_trylock() error handling
87ab6b527f07 net: cpsw_new: Fix unnecessary netdev unregistration in cpsw_probe() error path
75fb57efdd78 drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set()
43bc12f6d611 tipc: fix RCU dereference race in tipc_aead_users_dec()
a4b964b7377c mtd: rawnand: pl353: Fix software ECC support
42ef7c504ae5 usb: dwc2: fix resume failure if dr_mode is host
a7a80c25b651 usb: dwc3: gadget: Move vbus draw to workqueue context
f3132336db39 PCI: dwc: Fix msg_atu_index assignment
b6e5cef4d6df mm/slab: use unsigned long for orig_size to ensure proper metadata align
aac2fee7513d scsi: ufs: core: Flush exception handling work when RPM level is zero
00d69f21ef2a perf/arm-cmn: Reject unsupported hardware configurations
65379adf7d23 remoteproc: imx_rproc: Fix invalid loaded resource table detection
e00549dd86f5 btrfs: continue trimming remaining devices on failure
2f926875dffe clk: rs9: Reserve 8 struct clk_hw slots for for 9FGV0841
0ca20d699b64 arm64: Fix non-atomic __READ_ONCE() with CONFIG_LTO=y
97c18f074ff1 PCI/IOV: Fix race between SR-IOV enable/disable and hotplug
d47f27e145f8 Revert "PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV"
875355152b33 kexec: derive purgatory entry from symbol
b2952dbeac2c ocfs2: fix reflink preserve cleanup issue
87272e3e70ec rapidio: replace rio_free_net() with kfree() in rio_scan_alloc_net()
68b5efd6c6b3 mm/highmem: fix __kmap_to_page() build error
27d953201eae mtd: spinand: Disable continuous read during probe
7037f3161a6d iio: gyro: itg3200: Fix unchecked return value in read_raw
ca46d2092f30 powerpc/smp: Add check for kcalloc() failure in parse_thread_groups()
ddb57354634b vhost: move vdpa group bound check to vhost_vdpa
74a29a02ff65 tools: Fix bitfield dependency failure
9bc366175509 arm64: poe: fix stale POR_EL0 values for ptrace
052c611bcb28 dm mpath: make pg_init_delay_msecs settable
a7733b51cd74 bus: fsl-mc: fix an error handling in fsl_mc_device_add()
d1d07cbeca04 io_uring/net: don't continue send bundle if poll was required for retry
37b14e59db5d usb: gadget: tegra-xudc: Add handling for BLCG_COREPLL_PWRDN
2efa9c02c9b4 mm/vmalloc: prevent RCU stalls in kasan_release_vmalloc_node
f8f73bf0f8a5 x86/kexec: add a sanity check on previous kernel's ima kexec buffer
77a31097d6df nvmem: Drop OF node reference on nvmem_add_one_cell() failure
982815bb0455 nfsd: fix return error code for nfsd_map_name_to_[ug]id
a437e3bf30e3 md/bitmap: fix GPF in write_page caused by resize race
d69de525bc7a xfs: check for deleted cursors when revalidating two btrees
d6f3f7d4dd8a xfs: check return value of xchk_scrub_create_subord
5de5be3ed7e7 xfs: only call xf{array,blob}_destroy if we have a valid pointer
078e78821d91 pinctrl: intel: Add code name documentation
339191811e6f PCI: endpoint: Fix swapped parameters in pci_{primary/secondary}_epc_epf_unlink() functions
9f2bfea51151 KVM: x86: Add SRCU protection for reading PDPTRs in __get_sregs2()
1c9b6aad70e5 xfs: fix remote xattr valuelblk check
084d39d7847f xfs: fix the xattr scrub to detect freemap/entries array collisions
ef42a8766ff3 xfs: fix freemap adjustments when adding xattrs to leaf blocks
e1b8c6452ee9 xfs: delete attr leaf freemap entries when empty
a40f31608598 iio: accel: adxl380: Avoid reading more entries than present in FIFO
90cde30d8815 mfd: omap-usb-host: Fix OF populate on driver rebind
428cfd5d5a50 mfd: qcom-pm8xxx: Fix OF populate on driver rebind
db131ef9d898 mfd: core: Add locking around 'mfd_of_node_list'
9813306610d0 iommu/vt-d: Flush dev-IOTLB only when PCIe device is accessible in scalable mode
34f36f9c6114 media: verisilicon: AV1: Fix tile info buffer size
2fbc8421d1db xfs: remove xfs_attr_leaf_hasname
3628a1a38404 xfs: mark data structures corrupt on EIO and ENODATA
96775be9f12f drm/bridge: anx7625: Fix invalid EDID size
d764b8dd4200 drm/buddy: Prevent BUG_ON by validating rounded allocation
51d54ff2b750 selftests/mm/charge_reserved_hugetlb: drop mount size for hugetlbfs
11165f420b2a mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations
cbae775b2265 drm: of: drm_of_panel_bridge_remove(): fix device_node leak
087d915bb1ea media: venus: vdec: restrict EOS addr quirk to IRIS2 only
99cf4a8fbf9e media: venus: vdec: fix error state assignment for zero bytesused
63922c96e137 arm64: dts: rockchip: Do not enable hdmi_sound node on Pinebook Pro
fbcc04ad7aec dm-unstripe: fix mapping bug when there are multiple targets in a table
c6138af1f545 dm-integrity: fix recalculation in bitmap mode
09d6efc6abd4 reset: gpio: suppress bind attributes in sysfs
f0cddb616f75 s390/pci: Handle futile config accesses of disabled devices directly
5aa2b0450031 clk: tegra: tegra124-emc: Fix potential memory leak in tegra124_clk_register_emc()
d5952a3bfdd6 media: i2c: ov01a10: Fix digital gain range
330d37a24ecb media: stm32: dcmipp: bytecap: clear all interrupts upon stream stop
bac9fc78f367 soc: rockchip: grf: Support multiple grf to be handled
61dfbb6bb9ee soc: rockchip: grf: Fix wrong RK3576_IOCGRF_MISC_CON definition
5059221d2ead clk: clk-apple-nco: Add "apple,t8103-nco" compatible
5b958dfe278f bus: omap-ocp2scp: fix OF populate on driver rebind
fce2fd4a2ca0 KVM: nSVM: Always use vmcb01 in VMLOAD/VMSAVE emulation
69aa67c1e22d soc: ti: pruss: Fix double free in pruss_clk_mux_setup()
eaa16059f9af soc: ti: k3-socinfo: Fix regmap leak on probe failure
e2e738e8dfbb dm: clear cloned request bio pointer when last clone bio completes
b95a9810c38c dm-integrity: fix a typo in the code for write/discard race
e438caff813f platform/x86: ISST: Add missing write block check
fdc06d36dab7 media: ipu6: Fix RPM reference leak in probe error paths
92019e41c1fe media: ipu6: Fix typo and wrong constant in ipu6-mmu.c
13aa594f5f7e media: i2c: ov5647: use our own mutex for the ctrl lock
e83c4debf2c1 media: ccs: Fix setting initial sub-device state
ecba356cd7c6 media: i2c: ov5647: Fix PIXEL_RATE value for VGA mode
fbf2a108ed5e media: i2c: ov5647: Sensor should report RAW color space
ff65571ffae5 media: i2c: ov5647: Correct minimum VBLANK value
58f1767ad5c9 media: i2c: ov5647: Correct pixel array offset
2dedda97a64e media: i2c: ov5647: Initialize subdev before controls
32a21ed2ad74 media: ccs: Avoid possible division by zero
1b103307df6d media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update()
b9c3b0a13636 media: i2c: ov01a10: Fix test-pattern disabling
b32a74bdc0a6 media: i2c: ov01a10: Fix passing stream instead of pad to v4l2_subdev_state_get_format()
93804dda39f0 media: i2c: ov01a10: Add missing v4l2_subdev_cleanup() calls
79dff20b1a57 media: i2c: ov01a10: Fix analogue gain range
fe3e92312a46 media: i2c: ov01a10: Fix reported pixel-rate value
577dafd9f68e media: i2c: ov01a10: Fix the horizontal flip control
fb09d8b80046 media: i2c/tw9906: Fix potential memory leak in tw9906_probe()
a114918270f0 media: i2c/tw9903: Fix potential memory leak in tw9903_probe()
2df98c45a74a media: cx25821: Add missing unmap in snd_cx25821_hw_params()
9c0a6ff53866 media: cx23885: Add missing unmap in snd_cx23885_hw_params()
e3fb15aadfc8 media: cx88: Add missing unmap in snd_cx88_hw_params()
7fa9754f48cb media: radio-keene: fix memory leak in error path
cffde73f0d5f media: verisilicon: AV1: Set IDR flag for intra_only frame type
5da29ade540b media: rockchip: rga: Fix possible ERR_PTR dereference in rga_buf_init()
4ff5b0fd1faa media: amphion: Drop min_queued_buffers assignment
b19beca4ae66 arm64: dts: apple: t8112-j473: Keep the HDMI port powered on
f1ceaaf93ea3 HID: logitech-hidpp: Check maxfield in hidpp_get_report_length()
e7ac1cd823cd HID: prodikeys: Check presence of pm->input_ep82
922bd3e498a4 HID: magicmouse: Do not crash on missing msc->input
04e50f45b517 HID: hid-pl: handle probe errors
43a19467d3f3 arm64: Disable branch profiling for all arm64 code
ce904c8a5bbe KVM: nSVM: Remove a user-triggerable WARN on nested_svm_load_cr3() succeeding
c481d4edf070 KVM: x86: Return "unsupported" instead of "invalid" on access to unsupported PV MSR
b61843503d54 ARM: omap2: Fix reference count leaks in omap_control_init()
8c73302be475 arm64: dts: qcom: x1e80100: Add missing TCSR ref clock to the DP PHYs
885e26f6845d media: verisilicon: AV1: Fix tx mode bit setting
72e6e79568f3 media: verisilicon: AV1: Fix enable cdef computation
b73d85231d5b media: chips-media: wave5: Fix device cleanup order to prevent kernel panic
156020e889ed media: chips-media: wave5: Fix kthread worker destruction in polling mode
4f2a51433a3a media: mtk-mdp: Fix a reference leak bug in mtk_mdp_remove()
c8737d33d4e8 media: mtk-mdp: Fix error handling in probe function
fe17309d9bf7 media: mediatek: encoder: Fix uninitialized scalar variable issue
9b8dc1d327e2 dm-verity: correctly handle dm_bufio_client_create() failure
ff613d11f78e phy: qcom: edp: Make the number of clocks flexible
6ad50d3a1670 Revert "PCI: qcom: Enable MSI interrupts together with Link up if 'Global IRQ' is supported"
57fa97ae2385 drm/tests: shmem: Swap names of export tests
501ace56f3f8 fpga: dfl: use subsys_initcall to allow built-in drivers to be added
885ec8577622 ASoC: SOF: ipc4-control: Keep the payload size up to date
20b55c3831cf ASoC: SOF: ipc4-control: Use the correct size for scontrol->ipc_control_data
491956b45b5f ASoC: SOF: ipc4-topology: Correct the allocation size for bytes controls
698988dda4db ASoC: SOF: ipc4-control: If there is no data do not send bytes update
47671671a370 clk: renesas: rzg2l: Select correct div round macro
2f7042ca608d clk: renesas: rzg2l: Fix intin variable size
7654e6e3cd6b rpmsg: core: fix race in driver_override_show() and use core helper
53d32735d77a netfilter: nf_conntrack_h323: fix OOB read in decode_choice()
8b841fd529db dpaa2-switch: validate num_ifs to prevent out-of-bounds write
ea5d7787635e net: consume xmit errors of GSO frames
e1407fb7c337 net/mlx5e: Fix "scheduling while atomic" in IPsec MAC address query
c7bbd8632bcf net/mlx5e: Support routed networks during IPsec MACs initialization
b32498dd7621 net/mlx5e: Separate address related variables to be in struct
2e4c69121156 net/mlx5: Fix missing devlink lock in SRIOV enable error path
53f5c553149a net/mlx5: E-switch, Clear legacy flag when moving to switchdev
6a825a26f9e3 net/mlx5: DR, Fix circular locking dependency in dump
ba3bf0f1bf1d RDMA/umem: Fix double dma_buf_unpin in failure path
67ba6b13dbca net: usb: pegasus: enable basic endpoint checking
f21d71a0962a RDMA/efa: Fix typo in efa_alloc_mr()
200bdb8d367c net: wan: farsync: Fix use-after-free bugs caused by unfinished tasklets
36abfc850cdf RDMA/core: Fix stale RoCE GIDs during netdev events at registration
075cbc1a4aa2 tipc: fix duplicate publication key in tipc_service_insert_publ()
9ea3671d70ee kcm: fix zero-frag skb in frag_list on partial sendmsg error
a5de36d6cee7 tls: Fix race condition in tls_sw_cancel_work_tx()
ec91078e1321 Bluetooth: L2CAP: Fix missing key size check for L2CAP_LE_CONN_REQ
ffb7214f04da Bluetooth: L2CAP: Fix not checking output MTU is acceptable on L2CAP_ECRED_CONN_REQ
730058f51b8f Bluetooth: L2CAP: Fix response to L2CAP_ECRED_CONN_REQ
8285742519b5 Bluetooth: hci_qca: Cleanup on all setup failures
935f324e4b24 Bluetooth: L2CAP: Fix result of L2CAP_ECRED_CONN_RSP when MTU is too short
1e09410c98fe Bluetooth: L2CAP: Fix invalid response to L2CAP_ECRED_RECONF_REQ
464808911fb9 Remove WARN_ALL_UNSEEDED_RANDOM kernel config option
f204c1379a98 wifi: cfg80211: wext: fix IGTK key ID off-by-one
cf95db5e33bd bnxt_en: Fix deleting of Ntuple filters
348a5f8d06c7 bnxt_en: Fix RSS context delete logic
21d1e80d0d6e net: ethernet: xscale: Check for PTP support properly
d077c45b34b8 net: ixp4xx_eth: convert to ndo_hwtstamp_get() and ndo_hwtstamp_set()
b88194c1cfe7 net: usb: lan78xx: scan all MDIO addresses on LAN7801
9c79b839a639 net: usb: kaweth: remove TX queue manipulation in kaweth_set_rx_mode
f7ad8b1d0e42 espintcp: Fix race condition in espintcp_close()
a3c8fede034f xfrm: always flush state and policy upon NETDEV_UNREGISTER event
2dfbc8c17dd1 ipmi: ipmb: initialise event handler read bytes
f1713988e932 xfrm: skip templates check for packet offload tunnel mode
dc0abce05513 xfrm6: fix uninitialized saddr in xfrm6_get_saddr()
2e4d5e8d86a9 ntb: ntb_hw_switchtec: Fix shift-out-of-bounds for 0 mw lut
0e9304209451 ntb: ntb_hw_switchtec: Fix array-index-out-of-bounds access
faf7f4073d5d rtc: zynqmp: correct frequency value
d4c08521c77d drm/amd/display: Remove conditional for shaper 3DLUT power-on
5c3de2cae7ce arm64: hugetlbpage: avoid unused-but-set-parameter warning (gcc-16)
4f2eb019d87b btrfs: replace BUG() with error handling in __btrfs_balance()
fc9e5af60dc1 ALSA: usb-audio: Add sanity check for OOB writes at silencing
7a3b0a893b94 drm/radeon: Add HAINAN clock adjustment
f8431b867223 spi: spidev: fix lock inversion between spi_lock and buf_lock
b701db9f535a drm/amd/display: bypass post csc for additional color spaces in dal
6561e0914ac9 drm/amdgpu: Add HAINAN clock adjustment
32a1f64f8ff6 ALSA: usb-audio: Update the number of packets properly at receiving
2d9cb8a280aa drm/amdgpu: Adjust usleep_range in fence wait
3fb5155a39ab drm/amd/display: Avoid updating surface with the same surface under MPO
761b208dfafc drm/amd/display: Fix system resume lag issue
9a4483972bf7 drm/amd/display: Fix writeback on DCN 3.2+
8ec5b525221e ARM: 9467/1: mm: Don't use %pK through printk
44c8c02779bf include: uapi: netfilter_bridge.h: Cover for musl libc
09e437ba3f2d ACPI: x86: Force enabling of PWM2 on the Yogabook YB1-X90
ecd2fc9e4c32 thermal: int340x: Fix sysfs group leak on DLVR registration failure
1b275bd49e58 libceph: define and enforce CEPH_MAX_KEY_LEN
a46cec9cc5b2 ceph: supply snapshot context in ceph_uninline_data()
39aef9080f27 fs/ntfs3: avoid calling run_get_entry() when run == NULL in ntfs_read_run_nb_ra()
9b877e5e1cbf fs/ntfs3: drop preallocated clusters for sparse and compressed files
7ef219656feb fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST
78b61f7eac37 fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata
398e768d1acc fs: ntfs3: check return value of indx_find to avoid infinite loop
0569822bb36c MIPS: Loongson: Make cpumask_of_node() robust against NUMA_NO_NODE
f86bee0ef4fd iio: magnetometer: Remove IRQF_ONESHOT
48be61552318 iio: Use IRQF_NO_THREAD
a4c154685855 mfd: intel-lpss: Add Intel Nova Lake-S PCI IDs
1fb137d985f2 Revert "mfd: da9052-spi: Change read-mask to write-mask"
0bfb54195be6 phy: fsl-imx8mq-usb: disable bind/unbind platform driver feature
c435e63530f7 phy: mvebu-cp110-utmi: fix dr_mode property read from dts
5db6da613e9c watchdog: imx7ulp_wdt: handle the nowayout option
21cc92fddf4f binder: don't use %pK through printk
bf66b535daed fix it87_wdt early reboot by reporting running timer
29e9413dfae9 serial: 8250: 8250_omap.c: Clear DMA RX running status only after DMA termination is done
aebf83897bb6 serial: 8250: 8250_omap.c: Add support for handling UART error conditions
9f70f78e22b3 staging: rtl8723bs: fix memory leak on failure path
1b72b834511d usb: chipidea: udc: fix DMA and SG cleanup in _ep_nuke()
f505b91db2c0 usb: gadget: f_fs: Fix ioctl error handling
3875c8eca2df usb: gadget: f_fs: fix DMA-BUF OUT queues
4d55fe3cd765 misc: eeprom: Fix EWEN/EWDS/ERAL commands for 93xx56 and 93xx66
aa97ccc3dc1e misc: bcm_vk: Fix possible null-pointer dereferences in bcm_vk_read()
297428ee6f6e phy: cadence-torrent: restore parent clock for refclk during resume
2930ddda9273 phy: ti: phy-j721e-wiz: restore mux selection during resume
874558ec341b dmaengine: stm32-mdma: initialize m2m_hw_period and ccr to fix warnings
340d7c73dab7 dmaengine: sun6i: Choose appropriate burst length under maxburst
a49028a796d7 most: core: fix resource leak in most_register_interface error paths
12afc931e7c7 fpga: of-fpga-region: Fail if any bridge is missing
0945ed3284e9 usb: typec: ucsi: psy: Fix voltage and current max for non-Fixed PDOs
3590c1751c1d serial: 8250_dw: handle clock enable errors in runtime_resume
98d6bdb521f2 staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure
23aaf922bd3e soundwire: intel_auxdevice: add cs42l45 codec to wake_capable_list
d6f73398da63 soundwire: dmi-quirks: add mapping for Avell B.ON (OEM rebranded of NUC15)
0e6bf9b4e291 dmaengine: stm32-dma3: use module_platform_driver
a5d00dff9711 9p/xen: protect xen_9pfs_front_free against concurrent calls
edc3261ceb73 m68k: nommu: fix memmove() with differently aligned src and dest for 68000
bc775cc7c085 HID: i2c-hid: Add FocalTech FT8112
563a6ab857b3 clk: microchip: core: correct return value on *_get_parent()
8d6bc7da8021 mailbox: sprd: clear delivery flag before handling TX done
22cfa9e10cfa remoteproc: mediatek: Break lock dependency to `prepare_lock`
34035ddfbd77 mailbox: sprd: mask interrupts that are not handled
9824db3eadb3 mailbox: imx: Skip the suspend flag for i.MX7ULP
fa3635fa761a mailbox: pcc: Remove spurious IRQF_ONESHOT usage
b74e552df8e5 remoteproc: imx_dsp_rproc: Skip RP_MBOX_SUSPEND_SYSTEM when mailbox TX channel is uninitialized
37b7cc18380c tracing: Fix false sharing in hwlat get_sample()
f7fc25362c07 riscv: vector: init vector context with proper vlenb
d42ec56b30ba scsi: ufs: mediatek: Fix page faults in ufs_mtk_clk_scale() trace event
2fcdc1ccc201 vhost: fix caching attributes of MMIO regions by setting them explicitly
c45363db0d5f scsi: buslogic: Reduce stack usage
dbf9416360aa hisi_acc_vfio_pci: update status after RAS error
9cf87b6bf6fb ata: libata: avoid long timeouts on hot-unplugged SATA DAS
9662e7b1e915 RDMA/rtrs-clt: For conn rejection use actual err number
78ac2b2f981f nfc: nxp-nci: remove interrupt trigger type
0ed3ab68c153 myri10ge: avoid uninitialized variable use
cbda3855897f PCI: Mark Nvidia GB10 to avoid bus reset
7e9a64228209 PCI: Add ACS quirk for Qualcomm Hamoa & Glymur
7a126c1b6cfa PCI: Enable ACS after configuring IOMMU for OF platforms
63345c47ae43 PCI: Fix pci_slot_lock () device locking
7ac154e37a91 PCI/AER: Clear stale errors on reporting agents upon probe
bc8710fd1b92 PCI: Mark ASM1164 SATA controller to avoid bus reset
ba2e3472022f net/rds: Clear reconnect pending bit
7ebd51c3f032 vmw_vsock: bypass false-positive Wnonnull warning with gcc-16
73a92ae5a990 net: usb: sr9700: remove code to drive nonexistent multicast filter
c8847a8eaacb bnxt_en: Allow ntuple filters for drops
39c6ab2d2eea wifi: ath10k: fix lock protection in ath10k_wmi_event_peer_sta_ps_state_chg()
16ca0282e099 wifi: rtw89: pci: restore LDO setting after device resume
2a4f7827e001 net: sfp: add quirk for Lantech 8330-265D
cec2ceb35ce7 octeontx2-af: Workaround SQM/PSE stalls by disabling sticky
416c01dd95f4 Bluetooth: btusb: Add device ID for Realtek RTL8761BU
5d0b46ab5d55 Bluetooth: btusb: Add new VID/PID for RTL8852CE
0f5c4d8745d7 Bluetooth: hci_conn: use mod_delayed_work for active mode timeout
a86ebcb3b08f Bluetooth: hci_conn: Set link_policy on incoming ACL connections
430bdb44c0b2 Bluetooth: btusb: Add support for MediaTek7920 0489:e158
cdcaafeb40f9 ipv4: fib: Annotate access to struct fib_alias.fa_state.
de3974edd057 wifi: iwlegacy: add missing mutex protection in il3945_store_measurement()
7d355d937dc3 wifi: iwlegacy: add missing mutex protection in il4965_store_tx_power()
b9074687ffea net: hns3: extend HCLGE_FD_AD_QID to 11 bits
70debb2b34a2 ipv4: igmp: annotate data-races around idev->mr_maxdelay
2803d02aa7a1 gro: change the BUG_ON() in gro_pull_from_frag0()
b3978714bd4a ext4: propagate flags to convert_initialized_extent()
81248b1eb3c5 net/rds: No shortcut out of RDS_CONN_ERROR
b0ea9e2a5644 wifi: rtw89: 8922a: add digital compensation for 2GHz
0a56a63a3bb3 wifi: rtw89: fix unable to receive probe responses under MLO connection
a8347aa56749 wifi: iwlwifi: mvm: check the validity of noa_len
4cca2bb73717 net: usb: r8152: fix transmit queue timeout
6cb281662a63 openrisc: define arch-specific version of nop()
8b300f726640 netfilter: xt_tcpmss: check remaining length before reading optlen
fb0af2fcee17 netfilter: nf_conntrack: Add allow_clash to generic protocol handler
c51755090c94 ext4: use reserved metadata blocks when splitting extent on endio
5b5a9abdc5f4 ext4: mark group extend fast-commit ineligible
9e9fb259bcdd ext4: move ext4_percpu_param_init() before ext4_mb_init()
102428f145f9 ext4: mark group add fast-commit ineligible
bd463fcd7f0c ipv6: exthdrs: annotate data-race over multiple sysctl
762e76c93823 ipv6: annotate data-races over sysctl.flowlabel_reflect
45e2b1cf2689 ipv6: annotate data-races in ip6_multipath_hash_{policy,fields}()
69b4bcaece65 wifi: cfg80211: allow only one NAN interface, also in multi radio
e2ee86fefe01 wifi: ath12k: fix preferred hardware mode calculation
4234f2d90f7b wifi: ath11k: Fix failure to connect to a 6 GHz AP
b71487cb692e wifi: ath11k: add pm quirk for Thinkpad Z13/Z16 Gen1
26c82ec5add2 wifi: rtw89: wow: add reason codes for disassociation in WoWLAN mode
faac634c2795 wifi: rtw89: mac: correct page number for CSI response
715c263119fd iommu/amd: move wait_on_sem() out of spinlock
b82073564373 wifi: libertas: fix WARNING in usb_tx_block
939dc5eddae6 net: wwan: mhi: Add network support for Foxconn T99W760
65bc40fea4fd iommu/arm-smmu-v3: Improve CMDQ lock fairness and efficiency
cf2d06c9fd4b dm: remove fake timeout to avoid leak request
209149bd758e dm: replace -EEXIST with -EBUSY
b4d46b4fb240 wifi: rtw88: Fix inadvertent sharing of struct ieee80211_supported_band data
9b5418070ee8 wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band()
46216a48cd89 wifi: rtw89: ser: enable error IMR after recovering from L1
e31daf5fbcda wifi: rtw89: 8922a: set random mac if efuse contains zeroes
1c7ad1b82ec4 wifi: rtw88: rtw8821cu: Add ID for Mercusys MU6H
0d0c2fb80ca4 wifi: rtw88: 8822b: Avoid WARNING in rtw8822b_config_trx_mode()
400ca64e87ac wifi: rtw88: fix DTIM period handling when conf->dtim_period is zero
5d77c36cd4b6 jfs: nlink overflow in jfs_rename
aeecd32724c5 jfs: Add missing set_freezable() for freezable kthread
de10c10eb0e8 ALSA: usb-audio: Add iface reset and delay quirk for AB13X USB Audio
ae583f113d15 ALSA: mixer: oss: Add card disconnect checkpoints
72210c1ad2d4 ALSA: hda/realtek - Enable mute LEDs on HP ENVY x360 15-es0xxx
bfefacf1996f ASoC: fsl: imx-rpmsg: use snd_soc_find_dai_with_mutex() in probe
21207c003700 spi: geni-qcom: Fix abort sequence execution for serial engine errors
10411f1f2c76 ASoC: SOF: Intel: hda: Fix NULL pointer dereference
566657cafa5d power: sequencing: fix missing state_lock in pwrseq_power_on() error path
648a26c3bda4 modpost: Amend ppc64 save/restfpr symnames for -Os build
31a37c62e6a5 ASoC: es8328: Add error unwind in resume
c46992fa770a HID: logitech-hidpp: Add support for Logitech K980
2ec472ad5c19 hwmon: (f71882fg) Add F81968 support
066bbecaef26 hwmon: (nct6775) Add ASUS Pro WS WRX90E-SAGE SE
2c7a5235a8c8 hwmon: (dell-smm) Add support for Dell OptiPlex 7080
ba5d922b3153 ASoC: codecs: max98390: Check return value of devm_gpiod_get_optional() in max98390_i2c_probe()
5a22d4560c35 drm/amd/display: avoid dig reg access timeout on usb4 link training fail
b21402b55722 drm/amd/display: Fix GFX12 family constant checks
f1c5fcf80d77 spi: spi-mem: Protect dirmap_create() with spi_mem_access_start/end
6d802e37525b ASoC: sunxi: sun50i-dmic: Add missing check for devm_regmap_init_mmio
2a85a0ebd33c gpio: aspeed-sgpio: Change the macro to support deferred probe
adae2d63f81d ALSA: hda/realtek: fix LG Gram Style 14 speakers
6e1664116a96 ALSA: hda/conexant: Add headset mic fix for MECHREVO Wujie 15X Pro
f5623483341b HID: elecom: Add support for ELECOM HUGE Plus M-HT1MRBK
0fa0a82274c8 HID: multitouch: add eGalaxTouch EXC3188 support
0f5fe6ae25f9 media: rkisp1: Fix filter mode register configuration
a205740a7231 drm/atmel-hlcdc: fix use-after-free of drm_crtc_commit after release
cc18db0860c8 drm/atmel-hlcdc: don't reject the commit if the src rect has fractional parts
25e832a78307 drm/atmel-hlcdc: fix memory leak from the atomic_destroy_state callback
fe3cf809c1e5 drm/amd/display: Disable FEC when powering down encoders
c3b6733dd4c9 PCI: Add Intel Nova Lake audio Device ID
02a4d03515d4 ASoC: soc-acpi-intel-arl-match: change rt722 amp endpoint to aggregated
ae57ffd142fa virt: vbox: uapi: Mark inner unions in packed structs as packed
359d29e76dba hyper-v: Mark inner union in hv_kvp_exchg_msg_value as packed
8e1664b9ee43 drm: Account property blob allocations to memcg
cc904b44e4e6 drm/amdkfd: Fix GART PTE for non-4K pagesize in svm_migrate_gart_map()
ee0dc6c66a91 drm/amdkfd: Relax size checking during queue buffer get
a2dfdb19f856 ALSA: hda/realtek: add HP Victus 16-e0xxx mute LED quirk
2d9b17a177c0 media: ipu6: Always close firmware stream
1ff2c616944c media: ipu6: Close firmware streams on streaming enable failure
a4257bf49221 media: ipu6: Ensure stream_mutex is acquired when dealing with node list
888523a37c93 media: mt9m114: Return -EPROBE_DEFER if no endpoint is found
22ffbc504a73 media: mt9m114: Avoid a reset low spike during probe()
461733d83e67 media: v4l2-async: Fix error handling on steps after finding a match
e220ec4c4596 media: cx25821: Fix a resource leak in cx25821_dev_setup()
5849ae68d7b8 media: solo6x10: Check for out of bounds chip_id
58dd722b6c3d media: pvrusb2: fix URB leak in pvr2_send_request_ex
a854c58dc989 media: adv7180: fix frame interval in progressive mode
ec2f37bbb733 drm/panel: Fix a possible null-pointer dereference in jdi_panel_dsi_remove()
533bd1c1e2ca media: amphion: Clear last_buffer_dequeued flag for DEC_CMD_START
aaced618189a spi: spi-mem: Limit octal DTR constraints to octal DTR situations
bbc8396394f2 ASoC: wm8962: Don't report a microphone if it's shorted to ground on plug
64d7ff20fb03 ASoC: wm8962: Add WM8962_ADC_MONOMIX to "3D Coefficients" mask
5b27fcb5d1eb drm/xe: Only toggle scheduling in TDR if GuC is running
2193fe76d360 drm/amd/display: only power down dig on phy endpoints
ef9ed9e786dd drm/amdgpu: Skip loading SDMA_RS64 in VF
a951d6630b3a HID: apple: Add "SONiX KN85 Keyboard" to the list of non-apple keyboards
23e7150afc70 drm/amd/display: Add signal type check for dcn401 get_phyd32clk_src
d89aef80790f drm/amdgpu: avoid a warning in timedout job handler
11718976c53a drm/amd/display: Fix dsc eDP issue
eba3bc49971d drm/amdgpu: add support for HDP IP version 6.1.1
4394a810dd66 media: mediatek: vcodec: Don't try to decode 422/444 VP9
1ba3a56f4854 media: chips-media: wave5: Process ready frames when CMD_STOP sent to Encoder
2ed2feef3d2a media: chips-media: wave5: Fix conditional in start_streaming
39a624a65c77 media: omap3isp: set initial format
b78de03a56ce media: omap3isp: isppreview: always clamp in preview_try_format()
89772f640b0b media: omap3isp: isp_video_mbus_to_pix/pix_to_mbus fixes
cf510785f74e drm/v3d: Set DMA segment size to avoid debug warnings
86ba653114ba spi: stm32: fix Overrun issue at < 8bpw
a57f1024b9d7 media: dvb-core: dmxdevfilter must always flush bufs
1aa3db5864d9 ASoC: SOF: ipc4: Support for sending payload along with LARGE_CONFIG_GET
ca36d953d7bb drm/amd/display: Add USB-C DP Alt Mode lane limitation in DCN32
46e108c70227 spi-geni-qcom: use xfer->bits_per_word for can_dma()
e15d7f3597de spi-geni-qcom: initialize mode related registers to 0
f3a26d1d0a37 drm/amdkfd: Handle GPU reset and drain retry fault race
29fd416e0e08 drm/amdgpu: fix NULL pointer issue buffer funcs
0c11e9f7cf94 gpu/panel-edp: add AUO panel entry for B140HAN06.4
3f44cdb5371f drm/display/dp_mst: Add protection against 0 vcpi
47af25d855b7 parisc: Prevent interrupts during reboot
589b7b0fc87e arm64: tegra: smaug: Add usb-role-switch support
eece81eeda10 Revert "arm64: zynqmp: Add an OP-TEE node to the device tree"
3dcd45cfda1b firmware: arm_ffa: Unmap Rx/Tx buffers on init failure
8d849adfbc3e pstore: ram_core: fix incorrect success return when vmap() fails
d53d092019f8 sched/debug: Fix updating of ppos on server write ops
c821922bb768 char: tpm: cr50: Remove IRQF_ONESHOT
117fe6b91c51 mailbox: bcm-ferxrm-mailbox: Use default primary handler
a321dd2b6356 crypto: hisilicon/qm - move the barrier before writing to the mailbox register
76f7abd4ee01 PCI/MSI: Unmap MSI-X region on error
bd1be0d58b61 clocksource/drivers/timer-integrator-ap: Add missing Kconfig dependency on OF
88c76792180d clocksource/drivers/sh_tmu: Always leave device running after probe
dea9989a3f39 bpf: Recognize special arithmetic shift in the verifier
4e3e57dbf46d bpf: crypto: Use the correct destructor kfunc type
caa44eb450d9 perf/x86/cstate: Add Airmont NP
af1e3d63c8e2 perf/x86/msr: Add Airmont NP
17440ef493aa bpf: verifier improvement in 32bit shift sign extension pattern
5ab9a958681e sparc: don't reference obsolete termio struct for TC* constants
8e6b0e2adf86 sparc: Synchronize user stack on fork and clone
bfc2420bac71 block: decouple secure erase size limit from discard size limit
1f0221070f02 blk-mq-debugfs: add missing debugfs_mutex in blk_mq_debugfs_register_hctxs()
7fb2e1fa6e98 xenbus: Use .freeze/.thaw to handle xenbus devices
6ac7d51ae076 ACPI: battery: fix incorrect charging status when current is zero
7aa95b6f1465 ACPI: x86: s2idle: Invoke Microsoft _DSM Function 9 (Turn On Display)
e3f21fdea4cb perf/cxlpmu: Replace IRQF_ONESHOT with IRQF_NO_THREAD
7f5a66a18b5c s390/perf: Disable register readout on sampling events
e35db916e803 cpufreq: dt-platdev: Block the driver from probing on more QC platforms
dec123825c1e md-cluster: fix NULL pointer dereference in process_metadata_update
d4ca6ca2c6f5 alpha: fix user-space corruption during memory compaction
33f53ac8e9d5 powercap: intel_rapl: Add PL4 support for Ice Lake
61103a85e632 ACPICA: Abort AML bytecode execution when executing AML_FATAL_OP
5e7c8b5cce4c ACPI: resource: Add JWIPC JVC9100 to irq1_level_low_skip_override[]
b803811485ac ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4()
be10c1bdf64a EFI/CPER: don't go past the ARM processor CPER record buffer
242c652849d9 APEI/GHES: ARM processor Error: don't go past allocated memory
b6be51a12441 APEI/GHES: ensure that won't go past CPER allocated record
7780c0bad2a3 EFI/CPER: don't dump the entire memory region
0cb30030b483 x86/xen/pvh: Enable PAE mode for 32-bit guest only when CONFIG_X86_PAE is set
7aac0a30dcf4 rnbd-srv: Zero the rsp buffer before using it
5dbe1f143597 arm64: Add support for TSV110 Spectre-BHB mitigation
fc38a1f0d55f perf/arm-cmn: Support CMN-600AE
c0ec4299b15b s390/purgatory: Add -Wno-default-const-init-unsafe to KBUILD_CFLAGS
bcbfd4d81812 tools/power cpupower: Reset errno before strtoull()
ab6564f416a6 smb: client: prevent races in ->query_interfaces()
5d2c4f182ea8 gfs2: fiemap page fault fix
a20d029585c2 smb: client: add proper locking around ses->iface_last_update
0a45c428ad19 btrfs: handle user interrupt properly in btrfs_trim_fs()
b034e842e326 btrfs: fallback to buffered IO if the data profile has duplication
67288113c5e6 dlm: validate length in dlm_search_rsb_tree
f57ccd4657c7 minix: Add required sanity checking to minix_check_superblock()
91705db6642c i3c: mipi-i3c-hci: Reset RING_OPERATION1 fields during init
689d85945cbd i3c: master: svc: Initialize 'dev' to NULL in svc_i3c_master_ibi_isr()
d209ebaee93f hfsplus: pretend special inodes as regular files
5632d14b2f2a audit: add missing syscalls to read class
727e5140e0cf fs/buffer: add alert in try_to_free_buffers() for folios without buffers
773855c2ef5f hfsplus: fix volume corruption issue for generic/498
3e762a03713e audit: add fchmodat2() to change attributes class
9c1c09c3d134 statmount: permission check should return EPERM
0fd52d901b69 rtc: interface: Alarm race handling should not discard preceding error
70a69f675b9f libperf build: Always place libperf includes first
5f15fa06dccb libperf: Don't remove -g when EXTRA_CFLAGS are used
73e1f48e5149 perf vendor events amd: Fix Zen 5 MAB allocation events
f7ed915c96b3 perf annotate: Fix memcpy size in arch__grow_instructions()
08e16d9a3cef perf maps: Fix reference count leak in maps__find_ams()
e9003b440603 libsubcmd: Fix null intersection case in exclude_cmds()
2edbcd501c7b perf callchain: Fix srcline printing with inlines
ccfafeb79a91 perf unwind-libdw: Fix invalid reference counts
4062fb52682c perf test stat tests: Fix for virtualized machines
99dc6b1674fb perf test stat: Update test expectations and events
6b3dd1674005 ASoC: dt-bindings: asahi-kasei,ak5558: Fix the supply names
6eb2b702dd61 ASoC: dt-bindings: asahi-kasei,ak4458: Fix the supply names
cbebce4ddfab ASoC: dt-bindings: asahi-kasei,ak4458: set unevaluatedProperties:false
596900f63aaf dt-bindings: phy: qcom-edp: Add missing clock for X Elite
e464e26b2457 SUNRPC: fix gss_auth kref leak in gss_alloc_msg error path
b4af38068467 SUNRPC: auth_gss: fix memory leaks in XDR decoding error paths
6bd22de73c12 Drivers: hv: vmbus: Use kthread for vmbus interrupts on PREEMPT_RT
e77bcf83bc90 ata: libata-scsi: refactor ata_scsi_translate()
17df036a24aa ata: pata_ftide010: Fix some DMA timings
f1cd271b431b ext4: use optimized mballoc scanning regardless of inode format
61e372122b6d ext4: fix dirtyclusters double decrement on fs shutdown
c05033cfc5c7 ext4: fix e4b bitmap inconsistency reports
2f4b1052246c ext4: fix memory leak in ext4_ext_shift_extents()
120c6bd7ca9d ext4: drop extent cache when splitting extent fails
d8ee559fccde ext4: drop extent cache after doing PARTIAL_VALID1 zeroout
96007fd3c106 ext4: don't cache extent during splitting extent
d17857b4fb9b ext4: don't zero the entire extent if EXT4_EXT_DATA_PARTIAL_VALID1
c83f08394056 ext4: subdivide EXT4_EXT_DATA_VALID1
e3a6498a6339 MIPS: Work around LLVM bug when gp is used as global register variable
6038e092508f drm/amd/display: Use same max plane scaling limits for all 64 bpp formats
6610bc8fe927 ASoC: rockchip: i2s-tdm: Use param rate if not provided by set_sysclk
b5f50519bf20 x86/hyperv: Fix error pointer dereference
0761447f6f51 btrfs: fix invalid leaf access in btrfs_quota_enable() if ref key not found
74a52716ec24 btrfs: use the correct type to initialize block reserve for delayed refs
ba6b6f1502fa efi: Fix reservation of unaccepted memory table
bc78bfd287f3 drm/xe/xe2_hpg: Fix handling of Wa_14019988906 & Wa_14019877138
c89bde96e8dd drm/xe/xe2_hpg: Add set of workarounds
9e18acc5aa0e drm/xe/ptl: Apply Wa_13011645652
8f6848b2f6ea drm/xe/mmio: Avoid double-adjust in 64-bit reads
26a40327c25c drm/xe: Switch MMIO interface to take xe_mmio instead of xe_gt
f5508f1e656c drm/xe: Adjust mmio code to pass VF substructure to SRIOV code
9472d36b3de9 drm/xe: Add xe_tile backpointer to xe_mmio
74bff541ec88 drm/xe: Switch mmio_ext to use 'struct xe_mmio'
0b433e086b9f drm/xe: Populate GT's mmio iomap from tile during init
85354b21a548 drm/xe: Move GSI offset adjustment fields into 'struct xe_mmio'
c31019bca815 drm/xe: Clarify size of MMIO region
6c5894d7acdb drm/xe: Create dedicated xe_mmio structure
4d4e940bc00b drm/xe: Move forcewake to 'gt.pm' substructure
acb70e2949d4 s390/kexec: Make KEXEC_SIG available when CONFIG_MODULES=n
2c538a0b3472 spi: wpcm-fiu: Fix potential NULL pointer dereference in wpcm_fiu_probe()
29f3824b08a9 drm/amd/display: Fix out-of-bounds stream encoder index v3
c4e4df8ea642 drm/amd/display: Reject cursor plane on DCE when scaled differently than primary
a0d367e13db6 drm/amdkfd: Fix watch_id bounds checking in debug address watch v2
288311849f8e ASoC: codecs: aw88261: Fix erroneous bitmask logic in Awinic init
42dbd7cadc2c drm/i915/acpi: free _DSM package when no connectors
b0f74f5d24fe ASoC: fsl_xcvr: Revert fix missing lock in fsl_xcvr_mode_put()
c11cd77a1811 drm/amdgpu: Fix memory leak in amdgpu_ras_init()
16e7e7ad8cdc drm/amdgpu: Use kvfree instead of kfree in amdgpu_gmc_get_nps_memranges()
18a7bbd11f17 drm/amdgpu: Fix memory leak in amdgpu_acpi_enumerate_xcc()
3f2d2cbe8e22 apparmor: fix aa_label to return state from compount and component match
19f2e4055626 apparmor: fix invalid deref of rawdata when export_binary is unset
202824a1f89a apparmor: avoid per-cpu hold underflow in aa_get_buffer
6c7e329629a4 apparmor: make label_match return a consistent value
d5eb32cf3e14 apparmor: remove apply_modes_to_perms from label_match
e43818b16815 apparmor: fix rlimit for posix cpu timers
bd7df71b91d9 apparmor: return -ENOMEM in unpack_perms_table upon alloc failure
47e351dfef60 apparmor: Fix & Optimize table creation from possibly unaligned memory
ec737e7fdf2f AppArmor: Allow apparmor to handle unaligned dfa tables
3852eb9a0392 apparmor: fix NULL sock in aa_sock_file_perm
77d2e4d03db6 net/mlx5e: Use unsigned for mlx5e_get_max_num_channels
481a86e5a0e5 net/mlx5: Fix multiport device check over light SFs
c65cdf46ce34 bonding: alb: fix UAF in rlb_arp_recv during bond up/down
0ff788b84fa5 octeontx2-af: Fix default entries mcam entry action
c480680be377 inet: move icmp_global_{credit,stamp} to a separate cache line
5aea79b91084 icmp: prevent possible overflow in icmp_global_allow()
a1f686d273d1 macvlan: observe an RCU grace period in macvlan_common_newlink() error path
1ec0d56a8467 ping: annotate data-races in ping_lookup()
6ed7864a5c1a bpftool: Fix truncated netlink dumps
f26af58f794d ipv6: fix a race in ip6_sock_set_v6only()
f3fe58ce3792 netfilter: nf_tables: fix use-after-free in nf_tables_addchain()
959ea349c7e2 net: remove WARN_ON_ONCE when accessing forward path array
64af43033503 ipvs: do not keep dest_dst if dev is going down
06676b8ea98f netfilter: nf_conntrack_h323: don't pass uninitialised l3num value
bb7ce39f8864 selftests: forwarding: vxlan_bridge_1d_ipv6: fix test failure with br_netfilter enabled
48f3c88a8eaa selftests: forwarding: vxlan_bridge_1d: fix test failure with br_netfilter enabled
724a405ce030 net: bridge: mcast: always update mdb_n_entries for vlan contexts
ac30e78dd8de net/rds: rds_sendmsg should not discard payload_len
ec4859ac5c93 xen-netback: reject zero-queue configuration from guest
a488001a8197 net: usb: catc: enable basic endpoint checking
ae3cfa51471c net: sparx5/lan969x: fix PTP clock max_adj value
bf5009a06e03 ipv6: Fix out-of-bound access in fib6_add_rt2node().
7ac58d883280 net: mscc: ocelot: add missing lock protection in ocelot_port_xmit_inj()
6702700ad94c net: mscc: ocelot: split xmit into FDMA and register injection paths
1bbcb4e9c02c net: mscc: ocelot: extract ocelot_xmit_timestamp() helper
9e1815472ae4 net: sparx5/lan969x: fix DWRR cost max to match hardware register width
569a833031d7 selftests: mlxsw: tc_restrictions: Fix test failure with new iproute2
8f6833d919ba cpuidle: Skip governor when only one idle state is available
d08fb559b455 ACPI: PM: Add unused power resource quirk for THUNDEROBOT ZERO
f712f7256324 objpool: fix the overestimation of object pooling metadata size
cf27a5efbbfb selftests/memfd: use IPC semaphore instead of SIGSTOP/SIGCONT
42c7b5d00261 kbuild: Add objtool to top-level clean target
5c32bfbcefc0 powercap: intel_rapl_tpmi: Remove FW_BUG from invalid version check
ff0641957bce ACPI: CPPC: Fix remaining for_each_possible_cpu() to use online CPUs
c065541b71b7 fs/ntfs3: Fix slab-out-of-bounds read in DeleteIndexEntryRoot
b97e371e5d1c fs/ntfs3: prevent infinite loops caused by the next valid being the same
dd6c81527d09 fs/ntfs3: Initialize new folios before use
65521ecb8640 io_uring/cancel: de-unionize file and user_data in struct io_cancel_data
0d1f21220261 drbd: always set BLK_FEAT_STABLE_WRITES
68feac21bd4d dmaengine: fsl-edma: don't explicitly disable clocks in .remove()
f076d69aae81 backlight: qcom-wled: Change PM8950 WLED configurations
92de557d5de4 backlight: qcom-wled: Support ovp values for PMI8994
37fa7dd13786 leds: qcom-lpg: Check the return value of regmap_bulk_write()
7814b1431848 pinctrl: single: fix refcount leak in pcs_add_gpio_func()
50a55756c90e pinctrl: qcom: sm8250-lpass-lpi: Fix i2s2_data_groups definition
103ac8e3a7f3 iio: sca3000: Fix a resource leak in sca3000_probe()
721f679d4eb2 ovl: Fix uninit-value in ovl_fill_real
a7a7196185c3 pinctrl: equilibrium: Fix device node reference leak in pinbank_init()
8991b4e55f85 usb: bdc: fix sleep during atomic
024ea0d2ff89 drivers: iio: mpu3050: use dev_err_probe for regulator request
2b81db8a7f44 mfd: simple-mfd-i2c: Add Delta TN48M CPLD support
02302482205a mfd: simple-mfd-i2c: Keep compatible strings in alphabetical order
8993ca8904db mfd: simple-mfd-i2c: Add SpacemiT P1 support
5614db619980 mfd: simple-mfd-i2c: Add compatible strings for Layerscape QIXIS FPGA
0ecce3512344 mfd: simple-mfd-i2c: Add MAX77705 support
e0527c09bcf1 mfd: arizona: Fix regulator resource leak on wm5102_clear_write_sequencer() failure
d225e23c07a4 Revert "mmc: rtsx_pci_sdmmc: increase power-on settling delay to 5ms"
a771b386cb6c phy: freescale: imx8qm-hsio: fix NULL pointer dereference
3fa4fdfe6883 coresight: etm3x: Fix cpulocked warning on cpuhp
151becfbe1fd watchdog: starfive-wdt: Fix PM reference leak in probe error path
91557f3459e5 iio: pressure: mprls0025pa: fix pressure calculation
b843b1f47868 iio: pressure: mprls0025pa: fix scan_type struct
188273fcb3c5 iio: pressure: mprls0025pa: fix interrupt flag
14207e94fe36 iio: pressure: mprls0025pa: fix SPI CS delay violation
72158f9ae29a iio: pressure: mprls0025pa: fix spi_transfer struct initialisation
b58f107f359d mmc: rtsx_pci_sdmmc: increase power-on settling delay to 5ms
1ec1a893ee2a serial: SH_SCI: improve "DMA support" prompt
5449736d2a84 serial: imx: change SERIAL_IMX_CONSOLE to bool
01b91cb3e748 staging: greybus: lights: avoid NULL deref
b1e288645d69 iio: test: drop dangling symbol in gain-time-scale helpers
9d00bf5ca6d5 soundwire: intel_ace2x: add SND_HDA_CORE dependency
055273d82544 dma: dma-axi-dmac: fix HW scatter-gather not looking at the queue
2813261626d4 dma: dma-axi-dmac: fix SW cyclic transfers
25da519fb5e9 dmaengine: mediatek: uart-apdma: Fix above 4G addressing TX/RX
525858eb00fb interconnect: mediatek: Aggregate bandwidth with saturating add
5d7c7c54b6a5 interconnect: mediatek: Don't hijack parent device
c5fa94489fe8 clk: mediatek: Fix error handling in runtime PM setup
56360aa4ddd7 clk: qcom: gfx3d: add parent to parent request map
cb7b741e350f clk: qcom: dispcc-sm7150: Fix dispcc_mdss_pclk1_clk_src
f9c45fb866d9 clk: qcom: dispcc-sdm845: Enable parents for pixel clocks
c4a00b99dc6d clk: Move clk_{save,restore}_context() to COMMON_CLK section
b109dd4970a0 clk: qcom: gcc-ipq5018: flag sleep clock as critical
596048c0d7ec clk: qcom: gcc-msm8917: Remove ALWAYS_ON flag from cpp_gdsc
6b3b27031c5b clk: qcom: gcc-msm8953: Remove ALWAYS_ON flag from cpp_gdsc
a4fb5a9dc622 clk: qcom: gcc-qdu1000: Update the SDCC RCGs to use shared_floor_ops
0c74a63b797c clk: qcom: gcc-x1e80100: Update the SDCC RCGs to use shared_floor_ops
1936fe74af4a clk: qcom: gcc-sdx75: Update the SDCC RCGs to use shared_floor_ops
daa1b65f23cd clk: qcom: gcc-sm4450: Update the SDCC RCGs to use shared_floor_ops
99db18b34fd6 clk: qcom: gcc-sm8450: Update the SDCC RCGs to use shared_floor_ops
762c69e6ed2a clk: meson: gxbb: Limit the HDMI PLL OD to /4 on GXL/GXM SoCs
909b48a3b3b4 clk: qcom: rcg2: compute 2d using duty fraction directly
662676d6e735 clk: qcom: gcc-sm8650: Use floor ops for SDCC RCGs
b1b6935689b8 clk: qcom: gcc-sm8550: Use floor ops for SDCC RCGs
762a26818934 fbdev: au1200fb: Fix a memory leak in au1200fb_drv_probe()
f620398f0db1 fbdev: of_display_timing: Fix device node reference leak in of_get_display_timings()
bcd1aea42610 tracing: Remove duplicate ENABLE_EVENT_STR and DISABLE_EVENT_STR macros
9b0513905e05 tracing: Properly process error handling in event_hist_trigger_parse()
596c8b168cfd fs/nfs: Fix readdir slow-start regression
2eff9d3537b8 nvdimm: virtio_pmem: serialize flush requests
6037124dbf67 scsi: csiostor: Fix dereference of null pointer rn
eb10468cef22 scsi: ufs: host: mediatek: Require CONFIG_PM
d52e13122d37 scsi: smartpqi: Fix memory leak in pqi_report_phys_luns()
b3a8b2bbc48e pNFS: fix a missing wake up while waiting on NFS_LAYOUT_DRAIN
84667e99a8bc RDMA/uverbs: Add __GFP_NOWARN to ib_uverbs_unmarshall_recv() kmalloc
2b3b3e0d8abf power: supply: qcom_battmgr: Recognize "LiP" as lithium-polymer
9fab0120907e power: supply: pm8916_lbc: Fix use-after-free for extcon in IRQ handler
896a54984905 mtd: spinand: Fix kernel doc
fbd5b014a966 mtd: parsers: ofpart: fix OF node refcount leak in parse_fixed_partitions()
130381dd82e7 cxl: Fix premature commit_end increment on decoder commit failure
5c32cabddc4e RDMA/core: add rdma_rw_max_sge() helper for SQ sizing
3c2ae79fb19d RDMA/rxe: Fix race condition in QP timer handlers
ee998cdbff66 RDMA/mlx5: Fix memory leak in GET_DATA_DIRECT_SYSFS_PATH handler
d533425ac1f2 RDMA/uverbs: Validate wqe_size before using it in ib_uverbs_post_send
8d9798d6ff41 NFS/localio: use GFP_NOIO and non-memreclaim workqueue in nfs_local_commit
af87ebd34318 nfs/localio: eliminate unnecessary kref in nfs_local_fsync_ctx
e97f5fac8ce9 mtd: parsers: Fix memory leak in mtd_parser_tplink_safeloader_parse()
d473b0677310 crypto: ccp - Send PSP_CMD_TEE_RING_DESTROY when PSP_CMD_TEE_RING_INIT fails
90c1858d4e65 crypto: ccp - Factor out ring destroy handling to a helper
809fd697dab0 crypto: ccp - Add an S4 restore flow
122c3cb563bd crypto: ccp - Declare PSP dead if PSP_CMD_TEE_RING_INIT fails
38c30ee6a626 platform/x86/amd/pmf: Prevent TEE errors after hibernate
3d2b60a8d682 vfio/pci: Lock upstream bridge for vfio_pci_core_disable()
12e07451ef98 mtd: rawnand: cadence: Fix return type of CDMA send-and-wait helper
9b67c7fd5bff IB/mlx5: Fix port speed query for representors
c8fb5c965ac7 RDMA/mlx5: Fix UMR hang in LAG error state unload
f143ea1ff6bd tools/power/x86/intel-speed-select: Fix file descriptor leak in isolate_cpus()
38c5b49fffa1 RDMA/iwcm: Fix workqueue list corruption by removing work_list
ce6f8e007682 RDMA/rxe: Fix double free in rxe_srq_from_init
6b644871d4e4 RDMA/rtrs-srv: fix SG mapping
93bdf715d33c power: supply: wm97xx: Fix NULL pointer dereference in power_supply_changed()
352e364a56cc power: supply: bq27xxx: fix wrong errno when bus ops are unsupported
e9667db8b17e power: reset: nvmem-reboot-mode: respect cell size for nvmem_cell_write
82d3eb97a976 power: supply: sbs-battery: Fix use-after-free in power_supply_changed()
2178dc65d45e power: supply: rt9455: Fix use-after-free in power_supply_changed()
dbe579e620ef power: supply: pm8916_lbc: Fix use-after-free in power_supply_changed()
b69bb88e20c6 power: supply: pm8916_bms_vm: Fix use-after-free in power_supply_changed()
4350505e82b4 power: supply: goldfish: Fix use-after-free in power_supply_changed()
f3fbe309c9bf power: supply: cpcap-battery: Fix use-after-free in power_supply_changed()
4aeaf03c1726 power: supply: bq25980: Fix use-after-free in power_supply_changed()
83c27fdd696a power: supply: bq256xx: Fix use-after-free in power_supply_changed()
76a42ba547a9 power: supply: act8945a: Fix use-after-free in power_supply_changed()
847eeb6c0efc power: supply: ab8500: Fix use-after-free in power_supply_changed()
7ac44096bad0 RDMA/hns: Notify ULP of remaining soft-WCs during reset
c3c45f367981 RDMA/hns: Fix RoCEv1 failure due to DSCP
562c96b1393d RDMA/hns: Fix WQ_MEM_RECLAIM warning
2adc6c08f960 IB/cache: update gid cache on client reregister event
46ccb0a0f950 RDMA/rtrs: server: remove dead code
6d59928f8b0e octeontx2-pf: Unregister devlink on probe failure
193a9e2d4d18 ionic: Rate limit unknown xcvr type messages
63692055743e octeon_ep_vf: ensure dbell BADDR updation
530a79f0589c octeon_ep: ensure dbell BADDR updation
2286bfef3368 octeon_ep: disable per ring interrupts
52731ef44381 serial: caif: fix use-after-free in caif_serial ldisc_close()
b04061f89ffc xfrm: fix ip_rt_bug race in icmp_route_lookup reverse path
35e00df60f7e net: Switch to skb_dstref_steal/skb_dstref_restore for ip_route_input callers
791f028b1e42 net: Add skb_dstref_steal and skb_dstref_restore
b89269bdb3ba net: sunhme: Fix sbus regression
21c303fec138 net: atm: fix crash due to unvalidated vcc pointer in sigd_send()
e99f816a424e smb: client: correct value for smbd_max_fragmented_recv_size
73ec7c96601d procfs: fix missing RCU protection when reading real_parent in do_task_stat()
d2c785733dfb net: hns3: fix double free issue for tx spare buffer
5cd63214b529 PCI: Add ACS quirk for Pericom PI7C9X2G404 switches [12d8:b404]
05feaf826390 netfilter: nft_set_rbtree: check for partial overlaps in anonymous sets
afe1a28fa9de netfilter: nft_set_rbtree: fix bogus EEXIST with NLM_F_CREATE with null interval
4f899976eedc netfilter: nft_counter: fix reset of counters on 32bit archs
bce4581e02d5 netfilter: nft_set_hash: fix get operation on big endian
79b713ef4261 netfilter: nfnetlink_queue: do shared-unconfirmed check before segmentation
371de2bef658 netfilter: nfnetlink_queue: optimize verdict lookup with hash table
cf70cedce327 nfc: hci: shdlc: Stop timers and work before freeing context
19e42490c89b inet: RAW sockets using IPPROTO_RAW MUST drop incoming ICMP
da637d725a11 bonding: only set speed/duplex to unknown, if getting speed failed
7d56ba306e93 octeontx2-af: Fix PF driver crash with kexec kernel booting
73db8a61af8b mptcp: fix receive space timestamp initialization
1f5433b23e2a of: unittest: fix possible null-pointer dereferences in of_unittest_property_copy()
530d1ecd3639 ucount: check for CAP_SYS_RESOURCE using ns_capable_noaudit()
d075cf169e82 ipc: don't audit capability check in ipc_permissions()
a4720c30ea77 selftests/mm: convert page_size to unsigned long
306c11e7b82e selftests/mm: pagemap_ioctl: Fix types mismatches shown by compiler options
3f3dc0663ca1 PCI/ACPI: Restrict program_hpx_type2() to AER bits
7d168610e727 PCI: Add defines for bridge window indexing
f68179cc3d88 PCI: Initialize RCB from pci_configure_device()
ef04714ef4ae wifi: ath10k: sdio: add missing lock protection in ath10k_sdio_fw_crashed_dump()
0f514a9bf432 PCI: Check parent for NULL in of_pci_bus_release_domain_nr()
f4a681c870d1 tcp: tcp_tx_timestamp() must look at the rtx queue
955c5d670b5a fat: avoid parent link count underflow in rmdir
063a6f22478e nfsd: never defer requests during idmap lookup
e4d0e135ee38 xdrgen: Initialize data pointer for zero-length items
25ad5d691390 NFS: NFSERR_INVAL is not defined by NFSv2
a3a05e5ae1bb xdrgen: Fix struct prefix for typedef types in program wrappers
771ba4c6a805 dm: use bio_clone_blkg_association
a84d30e8d2ba iommu/vt-d: Clear Present bit before tearing down PASID entry
e148b5194ad9 iommu/vt-d: Avoid draining PRQ in sva mm release path
191311180935 iommu/vt-d: Drain PRQs when domain removed from RID
d5cd1db0ac93 iommu/vt-d: Separate page request queue from SVM
5962c30a6f05 iommu/vt-d: Flush cache for PASID table before using it
428a543c4ab1 PCI: Mark 3ware-9650SA Root Port Extended Tags as broken
19d0708a39ed kallsyms/ftrace: set module buildid in ftrace_mod_address_lookup()
0bdc4b1ad694 module: add helper function for reading module_buildid()
95d9748cc9b4 netfilter: nf_conncount: fix tracking of connections from localhost
63fece123bbe netfilter: nft_compat: add more restrictions on netlink attributes
3d0994ed0aa1 netfilter: nf_conncount: increase the connection clean up limit to 64
4fe47671aa29 netfilter: nf_conncount: make nf_conncount_gc_list() to disable BH
01726b9021cb netfilter: nf_tables: reset table validation state on abort
f6c4c7a5cf5b wifi: cfg80211: stop NAN and P2P in cfg80211_leave
fa9861e5c8af mctp i2c: initialise event handler read bytes
8468dd5bc1c4 net: mctp-i2c: fix duplicate reception of old data
414259caf81a quota: fix livelock between quotactl and freeze_super
dec62b741a39 dm: use READ_ONCE in dm_blk_report_zones
175ac0a61154 dm: fix unlocked test for dm_suspended_md
160913364fcc PCI/portdrv: Fix potential resource leak
d773a4826195 PCI: Do not attempt to set ExtTag for VFs
c8c6cb9fa632 Documentation: tracing: Add PCI tracepoint documentation
2cacab8c7a05 Documentation: trace: Refactor toctree
b53efc230ab2 docs: fix WARNING document not included in any toctree
51b7181cfbed PCI/P2PDMA: Release per-CPU pgmap ref when vm_insert_page() fails
33b2230edd86 wifi: cfg80211: Fix use_for flag update on BSS refresh
9e2b4159289c PCI/PM: Avoid redundant delays on D3hot->D3cold
29c4f6e0ac97 Documentation: PCI: endpoint: Fix ntb/vntb copy & paste errors
e44b390e01c1 PCI: mediatek: Fix IRQ domain leak when MSI allocation fails
d8308dff30bd hwmon: (pmbus/mpq8785) fix VOUT_MODE mismatch during identification
369d2ed2da20 hwmon: pmbus: mpq8785: Add support for MPM82504
8c311c726f1f hwmon: pmbus: mpq8785: Implement VOUT feedback resistor divider ratio configuration
7cd0bc5fe14c hwmon: pmbus: mpq8785: Prepare driver for multiple device support
914b47c9b824 Revert "hwmon: (ibmpex) fix use-after-free in high/low store"
ee842490a604 spi: tools: Add include folder to .gitignore
0b605e8ce606 HID: intel-ish-hid: fix NULL-ptr-deref in ishtp_bus_remove_all_clients
1a2482e5fcb4 platform/chrome: cros_ec_lightbar: Fix response size initialization
be7486307449 drm/xe: Unregister drm device on probe error
450d8e18ba8b evm: Use ordered xattrs list to calculate HMAC in evm_init_hmac()
e25b9f071226 media: uvcvideo: Fix allocation for small frame sizes
9aae11893e55 platform/chrome: cros_typec_switch: Don't touch struct fwnode_handle::dev
b61deabec46b drm/buddy: release free_trees array on buddy mm teardown
af8294a2a51c drm/msm/a2xx: fix pixel shader start on A225
9f6453e5177a media: ccs: Accommodate C-PHY into the calculation
33a76dcced8c drm/msm/dpu: fix CMD panels on DPU 1.x - 3.x
9c53a12b3eb4 drm/msm/disp: set num_planes to 1 for interleaved YUV formats
d955aeb26e12 HID: playstation: Add missing check for input_ff_create_memless
db3cc304a9a6 regulator: core: move supply check earlier in set_machine_constraints()
a2106181066a drm/msm/dpu: fix WD timer handling on DPU 8.x
f5478534cd47 drm/msm/dpu: Set vsync source irrespective of mdp top support
03306604738b drm/msm/disp/dpu: add merge3d support for sc7280
ba4c9a09e360 drm/amdgpu: Use explicit VCN instance 0 in SR-IOV init
0d4c7c2cbdf9 drm/amdkfd: Fix signal_eviction_fence() bool return value
9654ca3790b1 drm/amd: Drop "amdgpu kernel modesetting enabled" message
52defdd4034d media: chips-media: wave5: Fix memory leak on codec_info allocation failure
3ad42057c5b8 ASoC: nau8821: Fixup nau8821_enable_jack_detect()
47e5bf04d05b ASoC: nau8821: Avoid unnecessary blocking in IRQ handler
bbedfab10d49 ASoC: nau8821: Consistently clear interrupts before unmasking
f8071500177f smack: /smack/doi: accept previously used values
17da2a78bd31 smack: /smack/doi must be > 0
b78e8a12edb3 drm/panthor: Evict groups before VM termination
d12be704f710 ALSA: vmaster: Relax __free() variable declarations
37135ec54b97 ALSA: pcm: Relax __free() variable declarations
232cfc860a9d ALSA: pcm: use new array-copying-wrapper
a54e02cc637b drm/panel: sw43408: Remove manual invocation of unprepare at remove
00b16c7b17b4 workqueue: Process rescuer work items one-by-one using a cursor
2178f0587c91 workqueue: Only assign rescuer work when really needed
fa80f288a5e4 workqueue: Factor out assign_rescuer_work()
104504a773b3 drm/panthor: Make sure we resume the tick when new jobs are submitted
47b2d73b5a0e drm/panthor: Fix the logic that decides when to stop ticking
4f74f3da52cb drm/panthor: Fix immediate ticking on a disabled tick
bab13dcc4404 drm/panthor: Fix the group priority rotation logic
202d532672b3 drm/panthor: Fix the full_tick check
8ec4f1b14a61 drm/panthor: Recover from panthor_gpu_flush_caches() failures
50a74e38ded1 arm64: dts: qcom: sm6115: Add CX_MEM/DBGC GPU regions
b5dc5990ee32 arm64: dts: qcom: agatti: Add CX_MEM/DBGC GPU regions
5d31ca77c743 arm64: dts: qcom: x1e: bus is 40-bits (fix 64GB models)
466400375386 arm64: dts: qcom: sdm845-db845c: specify power for WiFi CH1
e3e856e399ed arm64: dts: qcom: sdm845-db845c: drop CS from SPIO0
982a23d5d35b arm64: dts: qcom: qrb4210-rb2: Fix UART3 wakeup IRQ storm
8f15df824262 arm64: dts: amlogic: g12: assign the MMC A signal clock
041037a24fbe arm64: dts: amlogic: g12: assign the MMC B and C signal clocks
8f5196fc8d17 arm64: dts: amlogic: gx: assign the MMC signal clocks
0378739bc8ce arm64: dts: amlogic: axg: assign the MMC signal clocks
ddf288f21d7a arm64: dts: amlogic: c3: assign the MMC signal clocks
d1ffd3c633a9 hwspinlock: omap: Handle devm_pm_runtime_enable() errors
03af8c0d468e arm64: dts: ti: k3-j784s4-j742s2-main-common.dtsi: Refactor watchdog instances for j784s4
3f1cb740e890 arm64: dts: ti: k3-j784s4-main.dtsi: Move c71_3 node to appropriate order
448d14117381 arm64: dts: amlogic: s4: fix mmc clock assignment
6cdbd53e0867 arm64: dts: amlogic: s4: assign mmc b clock to 24MHz
3d9d76bfaf28 arm64: dts: mediatek: mt8183-jacuzzi-pico6: Fix typo in pinmux node
e018f7d42b58 arm: dts: lpc32xx: add clocks property to Motor Control PWM device tree node
4b992b5cadf6 ARM: dts: lpc32xx: Set motor PWM #pwm-cells property value to 3 cells
f8b16d5764ee powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event handling
a58c97828911 soc: mediatek: svs: Fix memory leak in svs_enable_debug_write()
cdcc7e335f2d soc: qcom: cmd-db: Use devm_memremap() to fix memory leak in cmd_db_dev_probe
682d9d73d513 powerpc/uaccess: Move barrier_nospec() out of allow_read_{from/write}_user()
37cf81576dff ARM: dts: allwinner: sun5i-a13-utoo-p66: delete "power-gpios" property
5a6ebb6cc3c5 arm64: dts: qcom: msm8994-octagon: Fix Analog Devices vendor prefix of AD7147
dce238e12d94 arm64: dts: qcom: x1e80100: Fix USB combo PHYs SS1 and SS2 ref clocks
a7037c3eb013 arm64: dts: qcom: sdm845-oneplus: Mark l14a regulator as boot-on
c818d840c878 arm64: dts: qcom: sdm845-oneplus: Don't mark ts supply boot-on
cd4b042521d2 arm64: dts: qcom: sdm630: fix gpu_speed_bin size
7aaa4384b871 clk: qcom: Return correct error code in qcom_cc_probe_by_index()
5c85820e3905 arm64: dts: tqma8mpql-mba8mp-ras314: Fix HDMI CEC pad control settings
255af53a67e1 arm64: dts: tqma8mpql-mba8mpxl: Fix HDMI CEC pad control settings
4a4ffd352a69 firmware: arm_ffa: Correct 32-bit response handling in NOTIFICATION_INFO_GET
dca904ffd751 EDAC/i5400: Fix snprintf() limit calculation in calculate_dimm_size()
1fd7c29a1543 EDAC/i5000: Fix snprintf() size calculation in calculate_dimm_size()
35b034cfddca soc: qcom: smem: handle ENOMEM error during probe
9a6fc69a570c pstore/ram: fix buffer overflow in persistent_ram_save_old()
d5b7730f0699 hwrng: core - use RCU and work_struct to fix race condition
24761c8441c4 hwrng: core - Allow runtime disabling of the HW RNG
38d80307decc crypto: starfive - Fix memory leak in starfive_aes_aead_do_one_req()
acd06323c2c4 fs/tests: exec: drop duplicate bprm_stack_limits test vectors
a6a73403733e sched/rt: Skip currently executing CPU in rto_next_cpu()
375622de010f sched/deadline: Clear the defer params
6e661a23d886 media: pci: mg4b: Use IRQF_NO_THREAD
8da4ba169435 mfd: wm8350-core: Use IRQF_ONESHOT
670abc7e5694 EDAC/altera: Remove IRQF_ONESHOT
fb7481344f9e scsi: efct: Use IRQF_ONESHOT and default primary handler
be3ff229b90a Bluetooth: btintel_pcie: Use IRQF_ONESHOT and default primary handler
5938fb0e3285 platform/x86: int0002: Remove IRQF_ONESHOT from request_irq()
a13566c2f7b7 genirq: Set IRQF_COND_ONESHOT in devm_request_irq().
0db169a91381 bpf: Fix bpf_xdp_store_bytes proto for read-only arg
d5c6f254528c crypto: caam - fix netdev memory leak in dpaa2_caam_probe
96bac9ce2292 crypto: hisilicon/trng - support tfms sharing the device
a9c6d178d822 x86/fgraph,bpf: Switch kprobe_multi program stack unwind to hw_regs path
41d766859df7 x86/fgraph,bpf: Fix stack ORC unwind from kprobe_multi return probe
3eb79d8d02c7 tracing: Add ftrace_fill_perf_regs() for perf event
a142bbc11f8b tracing: Add ftrace_partial_regs() for converting ftrace_regs to pt_regs
33d4e904e24d fgraph: Replace fgraph_ret_regs with ftrace_regs
fee2da394085 ftrace: Rename ftrace_regs_return_value to ftrace_regs_get_return_value
ff57dbe037be ftrace: Use arch_ftrace_regs() for ftrace_regs_*() macros
a701884d1398 ftrace: Consolidate ftrace_regs accessor functions for archs using pt_regs
550a16d87d33 ftrace: Make ftrace_regs abstract from direct use
ef3166bd8d33 tracing: Add a comment about ftrace_regs definition
c2681ce178a2 bpf, sockmap: Fix FIONREAD for sockmap
4f9f0cbb4b27 bpf, sockmap: Fix incorrect copied_seq calculation
57cd88f4b609 crypto: ccp - narrow scope of snp_range_list
1c3506ea8599 crypto: ccp - Ensure implicit SEV/SNP init and shutdown in ioctls
cf8a8f13deb0 hrtimer: Fix trace oddity
0f893b33e6a7 selftests/bpf: Fix resource leak in serial_test_wq on attach failure
58059335e465 bpf: Preserve id of register in sync_linked_regs()
0bbfa5542670 crypto: hisilicon/sec2 - support skcipher/aead fallback for hardware queue unavailable
21ad2c1dcb18 crypto: hisilicon/zip - adjust the way to obtain the req in the callback function
ce2e7e471da0 crypto: octeontx - fix dma_free_coherent() size
dc8af9baf764 crypto: cavium - fix dma_free_coherent() size
4e39e4d847b0 ARM: VDSO: Patch out __vdso_clock_getres() if unavailable
5731312c4cb5 libbpf: Fix OOB read in btf_dump_get_bitfield_value
5478540eafbe selftests/bpf: veristat: fix printing order in output_stats()
138fc0ee9034 crypto: qat - fix warning on adf_pfvf_pf_proto.c
9faf20a1819b perf/x86/core: Do not set bit width for unavailable counters
f96c5ccf95ae s390/cio: Fix device lifecycle handling in css_alloc_subchannel()
06b3e765fdc5 PM: sleep: wakeirq: harden dev_pm_clear_wake_irq() against races
73caf86fe92e cpufreq: intel_pstate: Enable asym capacity only when CPU SMT is not possible
26bec96bc5f3 perf: arm_spe: Properly set hw.state on failures
b909d420d6b8 PM: wakeup: Handle empty list in wakeup_sources_walk_start()
c94fd6e8a71e md/raid1: fix memory leak in raid1_run()
aaac92c72d6e md/raid1: fix memory leak in raid1_run() if no active rdev
db8c4b15deab Partial revert "x86/xen: fix balloon target initialization for PVH dom0"
dbe8e81a2ec6 ublk: Validate SQE128 flag before accessing the cmd
8af710156c53 thermal/of: Fix reference leak in thermal_of_cm_lookup()
87283ce6218b iomap: fix submission side handling of completion side errors
10bb2f5d365d cpufreq: scmi: Fix device_node reference leak in scmi_cpu_domain_id()
b114bc9f075c OPP: Return correct value in dev_pm_opp_get_level
9a205d16e88b md/raid10: fix any_working flag handling in raid10_sync_request
fcb54ef1dbfc md/raid5: fix raid5_run() to return error when log_init() fails
3c08d86d0c8e thermal: intel: x86_pkg_temp_thermal: Handle invalid temperature
101cc8e5506a cpuidle: governors: menu: Always check timers with tick stopped
c812673deb81 io_uring/sync: validate passed in offset
cce354524da4 ACPICA: Fix NULL pointer dereference in acpi_ev_address_space_dispatch()
a67a23e9dedf io_uring: use release-acquire ordering for IORING_SETUP_R_DISABLED
becedc3aceca xen/virtio: Don't use grant-dma-ops when running as Dom0
4dd5c62c201c rnbd-srv: Fix server side setting of bi_size for special IOs
5afd2f4e1608 rnbd-srv: use bio_add_virt_nofail
cef2315cb84e block: add a bio_add_virt_nofail helper
4d339b219004 smb: client: fix potential UAF and double free in smb2_open_file()
4eb830847d84 btrfs: fix block_group_tree dirty_list corruption
af30ffbdeb05 btrfs: qgroup: return correct error when deleting qgroup relation item
8d582d65d20b erofs: handle end of filesystem properly for file-backed mounts
113eac582ccb erofs: get rid of raw bi_end_io() usage
cc09d55f519e tpm: st33zp24: Fix missing cleanup on get_burstcount() error
a61b8412e3eb tpm: tpm_i2c_infineon: Fix locality leak on get_burstcount() failure
140a45bd4f6d i3c: dw: Fix memory leak in dw_i3c_master_i2c_xfers()
7ff9c410dd26 i3c: dw: Initialize spinlock to avoid upsetting lockdep
87d4954b5c59 gfs2: Fix use-after-free in iomap inline data write path
ca7c67bdd293 gfs2: Fix slab-use-after-free in qd_put
ae4d9781ed0f gfs2: Retries missing in gfs2_{rename,exchange}
1d8a994edffa i3c: master: Update hot-join flag only on success
7edd798f191e fs: add <linux/init_task.h> for 'init_fs'
28050803c559 i3c: Move device name assignment after i3c_bus_init
01fd0ceb44e1 audit: move the compat_xxx_class[] extern declarations to audit_arch.h
1f16679a5aa6 rcu: Fix rcu_read_unlock() deadloop due to softirq
586a5effe50f rcu: Remove local_irq_save/restore() in rcu_preempt_deferred_qs_handler()
24d44e0f05ab rcu: Refactor expedited handling check in rcu_read_unlock_special()
51838112d9c2 hfsplus: return error when node already exists in hfs_bnode_create
517813eb6e73 auxdisplay: arm-charlcd: fix release_mem_region() size
9c80d688f402 RDMA/umad: Reject negative data_len in ib_umad_write
87b7a036d2c7 RDMA/siw: Fix potential NULL pointer dereference in header processing
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/linux-yocto-rt_6.12.bb | 6 ++--
.../linux/linux-yocto-tiny_6.12.bb | 6 ++--
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++----------
3 files changed, 20 insertions(+), 20 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
index a8d17a5c14..444cab413f 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
@@ -15,13 +15,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "96b72162b68a3a6084945ef4bf357a3de5c196ed"
-SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699"
+SRCREV_machine ?= "5c7879a7b2753ea23b696b6a3e7e4a38c40f5776"
+SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
-LINUX_VERSION ?= "6.12.74"
+LINUX_VERSION ?= "6.12.76"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
index 22b15e69f2..63135de5c7 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
@@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc
include recipes-kernel/linux/cve-exclusion.inc
include recipes-kernel/linux/cve-exclusion_6.12.inc
-LINUX_VERSION ?= "6.12.74"
+LINUX_VERSION ?= "6.12.76"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
-SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699"
+SRCREV_machine ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
+SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c"
PV = "${LINUX_VERSION}+git"
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
index 92807f9057..0e1b1fa61f 100644
--- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
@@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base"
KBRANCH:qemuloongarch64 ?= "v6.12/standard/base"
KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "f4b46d6d3a4e38d532c5e11866d3d071ae398f16"
-SRCREV_machine:qemuarm64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
-SRCREV_machine:qemuloongarch64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
-SRCREV_machine:qemumips ?= "da8487babd144628f801a204696523e077829fa2"
-SRCREV_machine:qemuppc ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
-SRCREV_machine:qemuriscv64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
-SRCREV_machine:qemuriscv32 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
-SRCREV_machine:qemux86 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
-SRCREV_machine:qemux86-64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
-SRCREV_machine:qemumips64 ?= "29ca2370cd8722cc5fd712f4a6b4757ad84fde3e"
-SRCREV_machine ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d"
-SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699"
+SRCREV_machine:qemuarm ?= "9dcacd6df5189be895d0b0d59d728ef61743338d"
+SRCREV_machine:qemuarm64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
+SRCREV_machine:qemuloongarch64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
+SRCREV_machine:qemumips ?= "eca7f78fe1f9f2bd98951df1100e46a8e39d0ea0"
+SRCREV_machine:qemuppc ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
+SRCREV_machine:qemuriscv64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
+SRCREV_machine:qemuriscv32 ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
+SRCREV_machine:qemux86 ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
+SRCREV_machine:qemux86-64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
+SRCREV_machine:qemumips64 ?= "8acf70fbeddae4770f3d24cbd8548402ae6a4f9e"
+SRCREV_machine ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
+SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "444b39ef6108313e8452010b22aaba588e8fb92b"
+SRCREV_machine:class-devupstream ?= "39b686f8d57d7506af7789e915fe7fd103b0fe57"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v6.12/base"
@@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "6.12.74"
+LINUX_VERSION ?= "6.12.76"
PV = "${LINUX_VERSION}+git"
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 08/18] linux-yocto/6.12: update CVE exclusions (6.12.76)
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (6 preceding siblings ...)
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 07/18] linux-yocto/6.12: update to v6.12.76 bruce.ashfield
@ 2026-04-23 15:44 ` bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 09/18] linux-yocto/6.12: update to v6.12.77 bruce.ashfield
` (10 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 3 changes (2 new | 1 updated): - 2 new CVEs: CVE-2025-70031, CVE-2026-0846 - 1 updated CVEs: CVE-2025-7195
Date: Mon, 9 Mar 2026 19:31:35 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/cve-exclusion_6.12.inc | 30 ++++++++++++++-----
1 file changed, 23 insertions(+), 7 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index c7726e1306..60d337b010 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2026-02-23 05:12:32.087151+00:00 for kernel version 6.12.74
-# From linux_kernel_cves cve_2026-02-23_0400Z-1-g3cbc7410733
+# Generated at 2026-03-09 19:34:33.465338+00:00 for kernel version 6.12.76
+# From linux_kernel_cves cve_2026-03-09_1900Z-1-gab0cca33c43
python check_kernel_cve_status_version() {
- this_version = "6.12.74"
+ this_version = "6.12.76"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -9032,6 +9032,8 @@ CVE_STATUS[CVE-2023-54326] = "fixed-version: Fixed from version 6.5"
CVE_STATUS[CVE-2023-7324] = "fixed-version: Fixed from version 6.3"
+# CVE-2024-14027 needs backporting (fixed from 6.13)
+
CVE_STATUS[CVE-2024-26581] = "fixed-version: Fixed from version 6.8"
CVE_STATUS[CVE-2024-26582] = "fixed-version: Fixed from version 6.8"
@@ -20396,12 +20398,8 @@ CVE_STATUS[CVE-2025-71224] = "cpe-stable-backport: Backported in 6.12.70"
CVE_STATUS[CVE-2025-71225] = "cpe-stable-backport: Backported in 6.12.70"
-# CVE-2025-71226 needs backporting (fixed from 6.19)
-
# CVE-2025-71227 needs backporting (fixed from 6.19)
-CVE_STATUS[CVE-2025-71228] = "cpe-stable-backport: Backported in 6.12.70"
-
CVE_STATUS[CVE-2025-71229] = "cpe-stable-backport: Backported in 6.12.72"
CVE_STATUS[CVE-2025-71230] = "fixed-version: only affects 6.13 onwards"
@@ -20420,6 +20418,8 @@ CVE_STATUS[CVE-2025-71236] = "cpe-stable-backport: Backported in 6.12.72"
CVE_STATUS[CVE-2025-71237] = "cpe-stable-backport: Backported in 6.12.72"
+CVE_STATUS[CVE-2025-71238] = "cpe-stable-backport: Backported in 6.12.74"
+
CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66"
CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66"
@@ -20930,3 +20930,19 @@ CVE_STATUS[CVE-2026-23229] = "cpe-stable-backport: Backported in 6.12.72"
CVE_STATUS[CVE-2026-23230] = "cpe-stable-backport: Backported in 6.12.72"
+CVE_STATUS[CVE-2026-23231] = "cpe-stable-backport: Backported in 6.12.75"
+
+CVE_STATUS[CVE-2026-23232] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23233] = "cpe-stable-backport: Backported in 6.12.74"
+
+CVE_STATUS[CVE-2026-23234] = "cpe-stable-backport: Backported in 6.12.74"
+
+CVE_STATUS[CVE-2026-23235] = "cpe-stable-backport: Backported in 6.12.74"
+
+CVE_STATUS[CVE-2026-23236] = "cpe-stable-backport: Backported in 6.12.74"
+
+CVE_STATUS[CVE-2026-23237] = "cpe-stable-backport: Backported in 6.12.74"
+
+CVE_STATUS[CVE-2026-23238] = "cpe-stable-backport: Backported in 6.12.74"
+
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 09/18] linux-yocto/6.12: update to v6.12.77
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (7 preceding siblings ...)
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 08/18] linux-yocto/6.12: update CVE exclusions (6.12.76) bruce.ashfield
@ 2026-04-23 15:45 ` bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 10/18] linux-yocto/6.12: update CVE exclusions (6.12.77) bruce.ashfield
` (9 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/6.12 to the latest korg -stable release that comprises
the following commits:
6f232446a629 Linux 6.12.77
1ba82a3bbc09 ata: libata-eh: Fix detection of deferred qc timeouts
0d12453818c3 ata: libata: cancel pending work after clearing deferred_qc
d2459cba1d99 ata: libata-eh: correctly handle deferred qc timeouts
42ea6c476b27 ata: libata-core: fix cancellation of a port deferred qc work
08d9175578d6 ext4: fix potential null deref in ext4_mb_init()
eecce0263999 apparmor: fix race between freeing data and fs accessing it
f9761add6d10 apparmor: fix race on rawdata dereference
34fc60b125ed apparmor: fix differential encoding verification
0fc63dd91706 apparmor: fix unprivileged local user can do privileged policy management
86feeccd6b93 apparmor: Fix double free of ns_name in aa_replace_profiles()
76b4d36c5122 apparmor: fix missing bounds check on DEFAULT table in verify_dfa()
b73c1dff8a9d apparmor: fix side-effect bug in match_char() macro usage
853ce31ca720 apparmor: fix: limit the number of levels of policy namespaces
999bd704b0b6 apparmor: replace recursive profile removal with iterative approach
786e2c2a87d9 apparmor: fix memory leak in verify_header
15c3eb8916e7 apparmor: validate DFA start states are in bounds in unpack_pdb
524ce8b4ea8f net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks
42b380f97d65 tracing: Add NULL pointer check to trigger_data_free()
1cf22986da18 selftest/arm64: Fix sve2p1_sigill() to hwcap test
c7c790a07697 xdp: produce a warning when calculated tailroom is negative
581e209d1ff0 i40e: use xdp.frame_sz as XDP RxQ info frag_size
7f46fd89d863 i40e: fix registering XDP RxQ info
addccd49c541 xsk: introduce helper to determine rxq->frag_size
c12b63c87250 xdp: use modulo operation to calculate XDP frag tailroom
91a89d3bdc2f net/sched: act_ife: Fix metalist update behavior
f7c9f8e36074 net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop
f0373e9317bc net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled
aa73deb3b6b7 net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled
4614301b900a selftests/harness: order TEST_F and XFAIL_ADD constructors
0b7cd6fa9aff kselftest/harness: Use helper to avoid zero-size memset warning
b73dfe1ea7be net: ethernet: mtk_eth_soc: Reset prog ptr to old_prog in case of error in mtk_xdp_setup()
c12d570d7192 netfilter: nft_set_pipapo: split gc into unlink and reclaim phase
dcba62d4fade net: stmmac: Fix error handling in VLAN add and delete paths
78141b8832e1 nfc: rawsock: cancel tx_work before socket teardown
0beea51b28b2 nfc: nci: clear NCI_DATA_EXCHANGE before calling completion callback
3245801d44a4 nfc: nci: free skb on nci_transceive early error paths
0196f36ad01e net_sched: sch_fq: clear q->band_pkt_count[] in fq_reset()
2451949f0584 net: nfc: nci: Fix zero-length proprietary notifications
5bc4e69306ed net: sched: avoid qdisc_reset_all_tx_gt() vs dequeue race for lockless qdiscs
5c38a7ed9a9f hwmon: (max6639) fix inverted polarity
d7040a5da952 hwmon: (max6639) : Configure based on DT property
15fb6d627484 nvme: fix memory allocation in nvme_pr_read_keys()
a0167a4984ca nvme: reject invalid pr_read_keys() num_keys values
549b68ba830f drm/xe/reg_sr: Fix leak on xa_store failure
9507f9953a2a i2c: i801: Revert "i2c: i801: replace acpi_lock with I2C bus lock"
1e6eaf2150ef drm/sched: Fix kernel-doc warning for drm_sched_job_done()
d6bdc685e19f amd-xgbe: fix sleep while atomic on suspend/resume
4bdc94d45d54 net: ipv4: fix ARM64 alignment fault in multipath hash seed
3310fc11fc47 ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu()
827c92c15ac8 smb/client: fix buffer size for smb311_posix_qinfo in SMB311_posix_query_info()
20a126dbd61e smb/client: fix buffer size for smb311_posix_qinfo in smb2_compound_op()
cfcfa0ca0212 bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim
3dfab6040c10 iavf: fix netdev->max_mtu to respect actual hardware limit
27e9019fe199 xen/acpi-processor: fix _CST detection using undersized evaluation buffer
8519e6883a94 net/rds: Fix circular locking dependency in rds_tcp_tune
1f8b8f0db008 indirect_call_wrapper: do not reevaluate function pointer
7b692dff8df0 wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211()
3356464e50e1 wifi: mt76: mt7925: Fix possible oob access in mt7925_mac_write_txwi_80211()
ca1adc04fc2c wifi: mt76: mt7996: Fix possible oob access in mt7996_mac_write_txwi_80211()
5feeea59ed14 wifi: wlcore: Fix a locking bug
35e173d7b878 wifi: cw1200: Fix locking in error paths
02973ef983cb octeon_ep_vf: avoid compiler and IQ/OQ reordering
4f3acd77273c octeon_ep_vf: Relocate counter updates before NAPI
496163a7292e octeon_ep: avoid compiler and IQ/OQ reordering
799cc585326f octeon_ep: Relocate counter updates before NAPI
d36ad7e126c6 bpf/bonding: reject vlan+srcmac xmit_hash_policy change when XDP is loaded
fcb74331c483 net: dsa: realtek: rtl8365mb: fix rtl8365mb_phy_ocp_write return value
6c8d7984cb25 kunit: tool: copy caller args in run_kernel to prevent mutation
8891bffb532a rust: kunit: fix warning when !CONFIG_PRINTK
1a42ea28e01b drm/xe: Do not preempt fence signaling CS instructions
b64fbd718cf4 wifi: rsi: Don't default to -EOPNOTSUPP in rsi_mac80211_config
38063cc435b6 can: mcp251x: fix deadlock in error path of mcp251x_open
8bcf2d847adb can: bcm: fix locking for bcm_op runtime updates
c8e57b713c17 amd-xgbe: fix MAC_TCR_SS register width for 2.5G and 10M speeds
ff4d5a3e77f7 net: ti: icssg-prueth: Fix ping failure after offload mode setup when link speed is not 1G
2d9f57ea29a1 atm: lec: fix null-ptr-deref in lec_arp_clear_vccs
fa4412cdc517 dpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler
3f2793713c13 xsk: Fix zero-copy AF_XDP fragment drop
2a9ea988465e xsk: Fix fragment node deletion to prevent buffer leak
bf56bae0e5ec xsk: s/free_list_node/list_node/
fd5614763805 xsk: Get rid of xdp_buff_xsk::xskb_list_node
ebcdcb5063dd net: ethernet: ti: am65-cpsw-nuss/cpsw-ale: Fix multicast entry handling in ALE table
98c92c9b2414 drm/solomon: Fix page start when updating rectangle in page addressing mode
54b631ac6935 e1000e: clear DPG_EN after reset to avoid autonomous power-gating
b7e91827e1cf i40e: Fix preempt count leak in napi poll tracepoint
7f213357476b idpf: change IRQ naming to match netdev and ethtool queue numbering
31f22b8051ee hwmon: (it87) Check the it87_lock() return value
188ba3468cb7 pinctrl: cirrus: cs42l43: Fix double-put in cs42l43_pin_probe()
c2611fc89506 HID: multitouch: new class MT_CLS_EGALAX_P80H84
bdaabb4cf660 HID: multitouch: add quirks for Lenovo Yoga Book 9i
6890141e856c platform/x86: thinkpad_acpi: Fix errors reading battery thresholds
af3b0ec98dc1 pinctrl: equilibrium: fix warning trace on load
5818c3fcd072 pinctrl: equilibrium: rename irq_chip function callbacks
d5e7ed87a3b6 hwmon: (aht10) Fix initialization commands for AHT20
947a50cf8abf hwmon: (aht10) Add support for dht20
64f87b96de0e nvme: fix admin queue leak on controller reset
8cad5463aec6 ACPI: APEI: GHES: Disable KASAN instrumentation when compile testing with clang < 18
400989c54567 btrfs: always fallback to buffered write if the inode requires checksum
5d219040ee7b net: stmmac: dwmac-loongson: Set clk_csr_i to 100-150MHz
4d1ea0416384 ARM: clean up the memset64() C wrapper
d151b94967c8 xattr: switch to CLASS(fd)
8899f3d3f3fa selftests: mptcp: join: check removing signal+subflow endp
7141b5997c59 selftests: mptcp: more stable simult_flows tests
ec5c17c687b1 scsi: core: Fix refcount leak for tagset_refcnt
b746a357abfb smb: client: Don't log plaintext credentials in cifs_set_cifscreds
5b3aa7384329 smb: client: fix broken multichannel with krb5+signing
4a5c8e1b6a58 smb: client: fix cifs_pick_channel when channels are equally loaded
1e906c08594c drbd: fix null-pointer dereference on local read error
eef1390125b6 drbd: fix "LOGIC BUG" in drbd_al_begin_io_nonblock()
9e9fa5ad37c9 Squashfs: check metadata block offset is within range
4fcfa424a581 scsi: target: Fix recursive locking in __configfs_open_file()
91f3e8d84c89 tracing: Fix WARN_ON in tracing_buffers_mmap_close
41170716421c nfsd: Fix cred ref leak in nfsd_nl_threads_set_doit().
78b8d2f55a56 net/sched: ets: fix divide by zero in the offload path
2fd37450d271 RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah()
da8eaa73bc37 IB/mthca: Add missed mthca_unmap_user_db() for mthca_create_srq()
f5d8af683410 wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame()
bfde158d5d13 wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration
57e39fe8da57 wifi: cfg80211: cancel rfkill_block work in wiphy_unregister()
2a60c588d5d3 wifi: radiotap: reject radiotap with unknown bits
d3904ca40515 ALSA: usb-audio: Use correct version for UAC3 header validation
9067651da90a platform/x86: dell-wmi: Add audio/mic mute key codes
0e6115c2f2fa platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data
399da820ecfe x86/efi: defer freeing of boot services memory
892dbaf46bb7 HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them
73f2354f5a33 can: usb: f81604: handle bulk write errors properly
c5d69da6c919 can: usb: f81604: handle short interrupt urb messages properly
b878444519fa can: usb: etas_es58x: correctly anchor the urb in the read bulk callback
bd85f21a6219 can: ucan: Fix infinite loop from zero-length messages
c001214e1220 can: usb: f81604: correctly anchor the urb in the read bulk callback
18f75b9cbdc3 can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message
95556b4e8797 net: usb: pegasus: validate USB endpoints
51c20ea5f155 net: usb: kalmia: validate USB endpoints
f33e80d195a0 net: usb: kaweth: validate USB endpoints
7ff14eb070f0 nfc: pn533: properly drop the usb interface reference on disconnect
d71781bad59b media: dvb-core: fix wrong reinitialization of ringbuffer on reopen
d1398cca55cf namespace: fix proc mount iteration
029be23f553b eventpoll: Fix integer overflow in ep_loop_check_proc()
2ad8b01cb7ee net: arcnet: com20020-pci: fix support for 2.5Mbit cards
ab6a494abecb ALSA: hda/conexant: Fix headphone jack handling on Acer Swift SF314
27e8f7a6a1b8 ALSA: hda/realtek: Add quirk for Samsung Galaxy Book3 Pro 360 (NP965QFG)
a797f5ebfca8 ALSA: hda/realtek: Add quirk for Gigabyte G5 KF5 (2023)
57b36d4c3474 LoongArch: Remove some extern variables in source files
8eeb34ae9d4c LoongArch: Handle percpu handler address for ORC unwinder
5d8e3b81aee2 LoongArch: Remove unnecessary checks for ORC unwinder
2e6949777d1d LoongArch/orc: Use RCU in all users of __module_address().
4c2ca3160852 ksmbd: add chann_lock to protect ksmbd_chann_list xarray
c9c00b85b85b ksmbd: check return value of xa_store() in krb5_authenticate
5345810d9a80 hwmon: (max16065) Use READ/WRITE_ONCE to avoid compiler optimization induced race
1b15298ef44b ALSA: hda/conexant: Add quirk for HP ZBook Studio G4
4b9d205dbc74 drm/amd: Fix hang on amdgpu unload by using pci_dev_is_disconnected()
56289298431e usb: cdns3: fix role switching during resume
eef31e654661 usb: cdns3: call cdns_power_is_lost() only once in cdns_resume()
151b775f5dbf usb: cdns3: remove redundant if branch
2788b1562776 btrfs: zoned: fixup last alloc pointer after extent removal for RAID0/10
acefb51f406c btrfs: define the AUTO_KFREE/AUTO_KVFREE helper macros
531c755f2507 btrfs: zoned: fix stripe width calculation
3a5125dd004c btrfs: zoned: fixup last alloc pointer after extent removal for DUP
21b26c833bfd btrfs: zoned: fixup last alloc pointer after extent removal for RAID1
ea7cc214d3b3 btrfs: zoned: fix alloc_offset calculation for partly conventional block groups
80cf22e7ffc1 btrfs: fix periodic reclaim condition
fcb261823f7a btrfs: fix reclaimed bytes accounting after automatic block group reclaim
c41742dabb80 btrfs: get used bytes while holding lock at btrfs_reclaim_bgs_work()
be5ee3033326 btrfs: drop unused parameter fs_info from do_reclaim_sweep()
6c9b043177e6 uprobes: Fix incorrect lockdep condition in filter_chain()
1d34cb886c82 uprobes: switch to RCU Tasks Trace flavor for better performance
abfdf449fb3d drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free
fe99afca8cea drm/exynos/vidi: Remove redundant error handling in vidi_get_modes()
4c4193829109 drm/exynos: vidi: fix to avoid directly dereferencing user pointer
51a31c0bc282 of/kexec: refactor ima_get_kexec_buffer() to use ima_validate_range()
f11d7d088f5e ima: verify the previous kernel's IMA buffer lies in addressable RAM
a3c9222702e1 ima: kexec: define functions to copy IMA log at soft boot
130e69879746 kexec: define functions to map and unmap segments
24d7c77955b8 ima: define and call ima_alloc_kexec_file_buf()
be4ac8d25924 ima: rename variable the seq_file "file" to "ima_kexec_file"
9e6bd0a8c1af ima: kexec: silence RCU list traversal warning
a97228fb32e1 clk: tegra: tegra124-emc: fix device leak on set_rate()
76cce803bf51 arm64: dts: rockchip: Fix rk3588 PCIe range mappings
497b04231b8f arm64: dts: rockchip: Fix rk356x PCIe range mappings
48b3f08e68b2 iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe device without scalable mode
9b5df5eedc02 Input: synaptics_i2c - guard polling restart in resume
432612bf478b Input: synaptics_i2c - replace use of system_wq with system_dfl_wq
c8272cfe36bd workqueue: Add system_percpu_wq and system_dfl_wq
9eea2f57d11b ext4: always allocate blocks only from groups inode can use
ec23aa36ddf3 ext4: implement linear-like traversal across order xarrays
5abec3fee594 ext4: refactor choose group to scan group
d99d714f714c ext4: convert free groups order lists to xarrays
007967dab681 ext4: factor out ext4_mb_scan_group()
2475d11bc431 ext4: factor out ext4_mb_might_prefetch()
ca4c90dd2aac ext4: factor out __ext4_mb_scan_group()
f0bb92429c97 ext4: add ext4_try_lock_group() to skip busy groups
01d9a8c2615d mailbox: Prevent out-of-bounds access in fw_mbox_index_xlate()
ac75c29c9c95 mailbox: Allow controller specific mapping using fwnode
b9816026481e mailbox: Use guard/scoped_guard for con_mutex
186ad0c3034a mailbox: Use dev_err when there is error
0469ec15c923 mailbox: remove unused header files
c7b57c4d294c mailbox: sort headers alphabetically
492c8eb02e81 mailbox: don't protect of_parse_phandle_with_args with con_mutex
2920ec61c98b ext4: don't set EXT4_GET_BLOCKS_CONVERT when splitting before submitting I/O
3e00915433df ext4: correct the comments place for EXT4_EXT_MAY_ZEROOUT
97ac11dbcb42 drm/tegra: dsi: fix device leak on probe
ce22aaed0112 ata: libata-scsi: avoid Non-NCQ command starvation
e44a35402439 ata: libata: Introduce ata_port_eh_scheduled()
87097457625a ata: libata: Remove ATA_DFLAG_ZAC device flag
4e0e3c784f37 ata: libata-scsi: Remove struct ata_scsi_args
bcb93aeed8b2 ata: libata-scsi: Document all VPD page inquiry actors
b057df339361 ata: libata-scsi: Refactor ata_scsiop_maint_in()
d62d7321212b ata: libata-scsi: Refactor ata_scsiop_read_cap()
2b3717897c38 ata: libata-scsi: Refactor ata_scsi_simulate()
2657439265d3 KVM: x86: Ignore -EBUSY when checking nested events from vcpu_block()
630a61552e58 media: dw9714: Fix powerup sequence
a4cf3497fb9a media: dw9714: add support for powerdown pin
1158193e7635 media: dw9714: move power sequences to dedicated functions
3ca2f0906173 media: tegra-video: Fix memory leak in __tegra_channel_try_format()
a29639a34297 PCI: Use resource_set_range() that correctly sets ->end
889b5cb678c1 resource: Add resource set range and size helpers
52d89a64dd31 Revert "PCI: qcom: Don't wait for link if we can detect Link Up"
29ff60fda59f PCI: qcom: Don't wait for link if we can detect Link Up
ff6c9a40e426 Revert "PCI: dw-rockchip: Don't wait for link since we can detect Link Up"
fdf5e166058a PCI: dw-rockchip: Don't wait for link since we can detect Link Up
1f23a48ff2b8 memory: mtk-smi: fix device leak on larb probe
984992f31cfb memory: mtk-smi: fix device leaks on common probe
a7df760f7074 x86/acpi/boot: Correct acpi_is_processor_usable() check again
2129ce65c83e PCI: Correct PCI_CAP_EXP_ENDPOINT_SIZEOF_V2 value
d2c31d8e03d0 bpf: Fix stack-out-of-bounds write in devmap
80ad264da02c bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing
283cc83f63e0 btrfs: fix compat mask in error messages in btrfs_check_features()
a78db325aca1 btrfs: print correct subvol num if active swapfile prevents deletion
390cc898680e btrfs: fix warning in scrub_verify_one_metadata()
ca57b339e4a7 btrfs: fix objectid value in error message in check_extent_data_ref()
0226914e4d5e btrfs: fix incorrect key offset in error message in check_dev_extent_item()
0507cf9ae0a9 ALSA: hda: cs35l56: Fix signedness error in cs35l56_hda_posture_put()
1c84c68e7524 ALSA: pci: hda: use snd_kcontrol_chip()
1359449b33bb drm/amdgpu: Fix locking bugs in error paths
3a9828141d4b drm/amdgpu: Replace kzalloc + copy_from_user with memdup_user
0518ce29ad20 drm/amdgpu: Unlock a mutex before destroying it
a7afb8f810c0 PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry
5e13ef9235c7 PCI: dwc: ep: Use align addr function for dw_pcie_ep_raise_{msi,msix}_irq()
fd9528fbe2fb PCI: dwc: endpoint: Implement the pci_epc_ops::align_addr() operation
9373f0bf9954 PCI: endpoint: Introduce pci_epc_mem_map()/unmap()
fa391a36e178 PCI: endpoint: Introduce pci_epc_function_is_valid()
00d5cf8c5978 s390/vtime: Fix virtual timer forwarding
3120d12adfbf s390/idle: Fix cpu idle exit cpu time accounting
5c48fdc4b462 perf: Fix __perf_event_overflow() vs perf_remove_from_context() race
367e4285127f ALSA: usb-audio: Use inclusive terms
192cc667e77e ALSA: usb-audio: Cap the packet size pre-calculations
1bcc4ea8207a scsi: ufs: core: Move link recovery for hibern8 exit failure to wl_resume
6e4f70034387 cgroup/cpuset: Fix incorrect use of cpuset_update_tasks_cpumask() in update_cpumasks_hier()
27d4450c8f2b rseq: Clarify rseq registration rseq_size bound check comment
3bc5887b0a2b x86/fred: Correct speculative safety in fred_extint()
5190fc2ba7a0 ALSA: usb-audio: Remove VALIDATE_RATES quirk for Focusrite devices
7cefc67b2c4f ALSA: scarlett2: Fix DSP filter control array handling
2fd1470ca412 ALSA: scarlett2: Fix redeclaration of loop variable
c5dc39f8ae05 scsi: pm8001: Fix use-after-free in pm8001_queue_command()
734c2363eb8a scsi: lpfc: Properly set WC for DPP mapping
686eb378a4a5 irqchip/sifive-plic: Fix frozen interrupt due to affinity setting
016f1f7ccafd KVM: arm64: Hide S1POE from guests when not supported by the host
871630255ecd drm/logicvc: Fix device node reference leak in logicvc_drm_config_parse()
36cb28b6d303 drm/vmwgfx: Return the correct value in vmw_translate_ptr functions
0d9cb5860077 drm/vmwgfx: Fix invalid kref_put callback in vmw_bo_dirty_release
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/linux-yocto-rt_6.12.bb | 6 ++--
.../linux/linux-yocto-tiny_6.12.bb | 6 ++--
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++----------
3 files changed, 20 insertions(+), 20 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
index 444cab413f..dd906d5ac6 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
@@ -15,13 +15,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "5c7879a7b2753ea23b696b6a3e7e4a38c40f5776"
-SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c"
+SRCREV_machine ?= "d684a294eb3f7a4122771290905565ddc36efd45"
+SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
-LINUX_VERSION ?= "6.12.76"
+LINUX_VERSION ?= "6.12.77"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
index 63135de5c7..2803d0215a 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
@@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc
include recipes-kernel/linux/cve-exclusion.inc
include recipes-kernel/linux/cve-exclusion_6.12.inc
-LINUX_VERSION ?= "6.12.76"
+LINUX_VERSION ?= "6.12.77"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
-SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c"
+SRCREV_machine ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
+SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799"
PV = "${LINUX_VERSION}+git"
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
index 0e1b1fa61f..294431f5dd 100644
--- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
@@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base"
KBRANCH:qemuloongarch64 ?= "v6.12/standard/base"
KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "9dcacd6df5189be895d0b0d59d728ef61743338d"
-SRCREV_machine:qemuarm64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
-SRCREV_machine:qemuloongarch64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
-SRCREV_machine:qemumips ?= "eca7f78fe1f9f2bd98951df1100e46a8e39d0ea0"
-SRCREV_machine:qemuppc ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
-SRCREV_machine:qemuriscv64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
-SRCREV_machine:qemuriscv32 ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
-SRCREV_machine:qemux86 ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
-SRCREV_machine:qemux86-64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
-SRCREV_machine:qemumips64 ?= "8acf70fbeddae4770f3d24cbd8548402ae6a4f9e"
-SRCREV_machine ?= "b1a05d710b72913717bcc1139e714080d99e79a8"
-SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c"
+SRCREV_machine:qemuarm ?= "448ef862c891700b3d94201e63a831b34a7713e4"
+SRCREV_machine:qemuarm64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
+SRCREV_machine:qemuloongarch64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
+SRCREV_machine:qemumips ?= "794aa4ace83aa50352e4abc39ed84229c864310c"
+SRCREV_machine:qemuppc ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
+SRCREV_machine:qemuriscv64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
+SRCREV_machine:qemuriscv32 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
+SRCREV_machine:qemux86 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
+SRCREV_machine:qemux86-64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
+SRCREV_machine:qemumips64 ?= "3b21c90c913a00a52877a25a4cd1aff57fc14695"
+SRCREV_machine ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
+SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "39b686f8d57d7506af7789e915fe7fd103b0fe57"
+SRCREV_machine:class-devupstream ?= "6f232446a62980e51f537db1c655e686d869b9ed"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v6.12/base"
@@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "6.12.76"
+LINUX_VERSION ?= "6.12.77"
PV = "${LINUX_VERSION}+git"
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 10/18] linux-yocto/6.12: update CVE exclusions (6.12.77)
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (8 preceding siblings ...)
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 09/18] linux-yocto/6.12: update to v6.12.77 bruce.ashfield
@ 2026-04-23 15:45 ` bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 11/18] linux-yocto/6.12: update to v6.12.79 bruce.ashfield
` (8 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 21 changes (20 new | 1 updated): - 20 new CVEs: CVE-2025-47873, CVE-2025-58427, CVE-2025-61952, CVE-2025-61979, CVE-2025-62403, CVE-2025-62500, CVE-2025-64301, CVE-2025-64733, CVE-2025-64735, CVE-2025-64776, CVE-2025-65119, CVE-2025-66000, CVE-2025-66042, CVE-2025-66342, CVE-2025-66503, CVE-2025-66617, CVE-2025-66633, CVE-2026-20726, CVE-2026-22882, CVE-2026-25790 - 1 updated CVEs: CVE-2026-3207
Date: Tue, 17 Mar 2026 18:55:39 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/cve-exclusion_6.12.inc | 20 +++++++++++++------
1 file changed, 14 insertions(+), 6 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index 60d337b010..5fa3966719 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2026-03-09 19:34:33.465338+00:00 for kernel version 6.12.76
-# From linux_kernel_cves cve_2026-03-09_1900Z-1-gab0cca33c43
+# Generated at 2026-03-17 19:07:54.629545+00:00 for kernel version 6.12.77
+# From linux_kernel_cves cve_2026-03-17_1800Z-2-g4ae4487ca91
python check_kernel_cve_status_version() {
- this_version = "6.12.76"
+ this_version = "6.12.77"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -9032,7 +9032,7 @@ CVE_STATUS[CVE-2023-54326] = "fixed-version: Fixed from version 6.5"
CVE_STATUS[CVE-2023-7324] = "fixed-version: Fixed from version 6.3"
-# CVE-2024-14027 needs backporting (fixed from 6.13)
+CVE_STATUS[CVE-2024-14027] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2024-26581] = "fixed-version: Fixed from version 6.8"
@@ -20420,6 +20420,8 @@ CVE_STATUS[CVE-2025-71237] = "cpe-stable-backport: Backported in 6.12.72"
CVE_STATUS[CVE-2025-71238] = "cpe-stable-backport: Backported in 6.12.74"
+CVE_STATUS[CVE-2025-71239] = "cpe-stable-backport: Backported in 6.12.75"
+
CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66"
CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66"
@@ -20920,9 +20922,9 @@ CVE_STATUS[CVE-2026-23224] = "cpe-stable-backport: Backported in 6.12.72"
CVE_STATUS[CVE-2026-23225] = "fixed-version: only affects 6.19 onwards"
-# CVE-2026-23226 needs backporting (fixed from 7.0rc1)
+CVE_STATUS[CVE-2026-23226] = "cpe-stable-backport: Backported in 6.12.77"
-# CVE-2026-23227 needs backporting (fixed from 7.0rc1)
+CVE_STATUS[CVE-2026-23227] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23228] = "cpe-stable-backport: Backported in 6.12.72"
@@ -20946,3 +20948,9 @@ CVE_STATUS[CVE-2026-23237] = "cpe-stable-backport: Backported in 6.12.74"
CVE_STATUS[CVE-2026-23238] = "cpe-stable-backport: Backported in 6.12.74"
+CVE_STATUS[CVE-2026-23239] = "cpe-stable-backport: Backported in 6.12.75"
+
+CVE_STATUS[CVE-2026-23240] = "cpe-stable-backport: Backported in 6.12.75"
+
+CVE_STATUS[CVE-2026-23241] = "cpe-stable-backport: Backported in 6.12.75"
+
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 11/18] linux-yocto/6.12: update to v6.12.79
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (9 preceding siblings ...)
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 10/18] linux-yocto/6.12: update CVE exclusions (6.12.77) bruce.ashfield
@ 2026-04-23 15:45 ` bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 12/18] linux-yocto/6.12: update CVE exclusions (6.12.79) bruce.ashfield
` (7 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/6.12 to the latest korg -stable release that comprises
the following commits:
c2d104a355013 Linux 6.12.79
62f01682102e0 Revert "LoongArch: Add machine_kexec_mask_interrupts() implementation"
4859112559405 Linux 6.12.78
1f00bad1b69b7 xen/privcmd: add boot control for restricted usage in domU
78432d8f0372c xen/privcmd: restrict usage in unprivileged domU
80b02e943613b perf/x86/intel: Add missing branch counters constraint apply
e7c963868b67a hwmon: (max6639) Fix pulses-per-revolution implementation
ebf6449effd94 tools/bootconfig: fix fd leak in load_xbc_file() on fstat failure
21156d04549d5 lib/bootconfig: check xbc_init_node() return in override path
1db7e11a2e2b9 fs/tests: exec: Remove bad test vector
2e20a886b443a drm/i915/gt: Check set_default_submission() before deferencing
568a25fd7bcdf ksmbd: fix use-after-free in durable v2 replay of active file handles
c742b46a153d3 ksmbd: fix use-after-free of share_conf in compound request
131e4cafa7662 drm/amd: fix dcn 2.01 check
7f7d2c4a2333e drm/amd/display: Fix DisplayID not-found handling in parse_edid_displayid_vrr()
33d289267dfd9 mtd: rawnand: brcmnand: skip DMA during panic write
f71ce0ae5aefe mtd: rawnand: serialize lock/unlock against other NAND operations
1bfd188284065 mm/shmem, swap: avoid redundant Xarray lookup during swapin
62414eec28583 mm/shmem, swap: improve cached mTHP handling and fix potential hang
1be8e41962f1f mm: shmem: avoid unpaired folio_unlock() in shmem_swapin_folio()
b0e49178f2ed1 mm: shmem: fix potential data corruption during shmem swapin
246bbe3ee76f6 mtd: spi-nor: core: avoid odd length/address writes in 8D-8D-8D mode
a0563931c0282 mtd: spi-nor: core: avoid odd length/address reads on 8D-8D-8D mode
9956d4892e788 x86/platform/uv: Handle deconfigured sockets
da102725b4df3 ring-buffer: Fix to update per-subbuf entries of persistent ring buffer
93cad30c061f4 i2c: pxa: defer reset on Armada 3700 when recovery is used
3facec19f80cc i2c: fsi: Fix a potential leak in fsi_i2c_probe()
13ccf9b106bba i2c: cp2615: fix serial string NULL-deref at probe
c6a24845728e9 USB: serial: f81232: fix incomplete serial port generation
3ccfbd4da541e drm/i915/psr: Compute PSR entry_setup_frames into intel_crtc_state
8b3267892b9ce hwmon: (pmbus/isl68137) Fix unchecked return value and use sysfs_emit()
15db8db56499f hwmon: (pmbus/mp2975) Add error check for pmbus_read_word_data() return value
9647e99d2a617 icmp: fix NULL pointer dereference in icmp_tag_validation()
665152cdd8ad0 net: dsa: bcm_sf2: fix missing clk_disable_unprepare() in error paths
7bd20f4b3ef30 net: mvpp2: guard flow control update with global_tx_fc in buffer switching
ec8bf0571b142 nfnetlink_osf: validate individual option lengths in fingerprints
7e3955b282eae netfilter: nf_tables: release flowtable after rcu grace period on error
cb2bf5efdb02a netfilter: bpf: defer hook memory release until rcu readers are done
6a3bb74e25d79 net: bonding: fix NULL deref in bond_debug_rlb_hash_show
9f036aa0fe46c udp_tunnel: fix NULL deref caused by udp_sock_create6 when CONFIG_IPV6=n
2051c709dce92 net/mlx5e: Fix race condition during IPSec ESN update
c3db55dc0f334 net/mlx5e: Prevent concurrent access to IPSec ASO context
869ff44ecf693 net/mlx5: qos: Restrict RTNL area to avoid a lock cycle
25136c005f714 net: macb: fix uninitialized rx_fs_lock
e0c470049344e ACPI: processor: Fix previous acpi_processor_errata_piix4() fix
cfa64e2b3717b wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom
a90279e7f7ea0 wifi: mac80211: fix NULL deref in mesh_matches_local()
97d97bf5b2d43 iavf: fix VLAN filter lost on add/delete race
5e4c90c94eb76 igc: fix page fault in XDP TX timestamps handling
79a230f90932a igc: fix missing update of skb->tail in igc_xmit_frame()
3267bcb744ee8 net: usb: aqc111: Do not perform PM inside suspend callback
37bef86e5428d clsact: Fix use-after-free in init/destroy rollback asymmetry
af0d1613d6751 net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check
789204f980730 net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check
652ec118d8dc1 net: airoha: Remove airoha_dev_stop() in airoha_remove()
4cba4373abac7 net: airoha: Read completion queue data in airoha_qdma_tx_napi_poll()
a04ac7bc97afe net: airoha: fix PSE memory configuration in airoha_fe_pse_ports_init()
a9ed47c366321 net: airoha: read default PSE reserved pages value before updating
afbc79a7770b2 net/sched: teql: Fix double-free in teql_master_xmit
cadf3da46c155 net/smc: fix NULL dereference and UAF in smc_tcp_syn_recv_sock()
946bb6cacf0cc bonding: prevent potential infinite loop in bond_header_parse()
c6febaacfb8a0 PM: runtime: Fix a race condition related to device removal
bd2a8f06c263b sched: idle: Consolidate the handling of two special cases
2b001901f6890 net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown
dcb88a003e390 net: bcmgenet: increase WoL poll timeout
633e8f87dad32 netfilter: nf_conntrack_h323: check for zero length in DecodeQ931()
171fe8e6da02c netfilter: xt_time: use unsigned int for monthday bit shift
19a230dec6bb8 netfilter: xt_CT: drop pending enqueued packets on template removal
6802ff8beceb9 netfilter: nft_ct: drop pending enqueued packets on removal
d1354873cbe3b nf_tables: nft_dynset: fix possible stateful expression memleak in error path
774a434f8c9c8 netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case
75fcaee5170e7 netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp()
f025171feef2a netfilter: ctnetlink: fix use-after-free in ctnetlink_dump_exp_ct()
078d33c95bf53 netfilter: ctnetlink: remove refcounting in expectation dumpers
be3a573ba719f mpls: add missing unregister_netdevice_notifier to mpls_init
508f49ccbe032 net/rose: fix NULL pointer dereference in rose_transmit_link on reconnect
e89dbd2736a45 bridge: cfm: Fix race condition in peer_mep deletion
8f8023ad95045 Bluetooth: qca: fix ROM version reading on WCN3998 chips
c22a5e659959e Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user
7c805b7d1e580 Bluetooth: HIDP: Fix possible UAF
695b45b2262fc Bluetooth: MGMT: Fix list corruption and UAF in command complete handlers
537a42a62e400 Bluetooth: hci_sync: Fix hci_le_create_conn_sync
f678ea4b1315f Bluetooth: ISO: Fix defer tests being unstable
c53c85583591b Bluetooth: SMP: make SM/PER/KDU/BI-04-C happy
ca97abddf1968 Bluetooth: LE L2CAP: Disconnect if sum of payload sizes exceed SDU
ab0b2de04d8de Bluetooth: LE L2CAP: Disconnect if received packet's SDU exceeds IMTU
158802642a695 firmware: arm_scpi: Fix device_node reference leak in probe path
71cdba40b4f8e firmware: arm_ffa: Remove vm_id argument in ffa_rxtx_unmap()
b82eac7a1a38f arm64: dts: renesas: r9a09g057: Remove wdt{0,2,3} nodes
d82a0f77999fb arm64: dts: renesas: r9a09g057: Add RTC node
d32c07ef1880f wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down
29a1a350afcd2 wifi: mac80211: Fix static_branch_dec() underflow for aql_disable.
af521c7d80ecc soc: fsl: cpm1: qmc: Fix error check for devm_ioremap_resource() in qmc_qe_init_resources()
751f60bd48eda soc: fsl: qbman: fix race condition in qman_destroy_fq
209551351a701 soc: rockchip: grf: Add missing of_node_put() when returning
44084194298cd cache: ax45mp: Fix device node reference leak in ax45mp_cache_init()
bff13109276a6 cache: starfive: fix device node leak in starlink_cache_init()
da4b44c42f405 soc: microchip: mpfs: Fix memory leak in mpfs_sys_controller_probe()
e6b8133e0f51d btrfs: tree-checker: fix misleading root drop_level error message
f556b1e09d054 btrfs: log new dentries when logging parent dir of a conflicting inode
18f67e5930724 ata: libata-scsi: report correct sense field pointer in ata_scsiop_maint_in()
e9b76a88cf046 ata: libata-scsi: Return residual for emulated SCSI commands
6b949a6b33cbd Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ
e2b424aadecb6 drm/xe: Open-code GGTT MMIO access protection
91edd662f4d9f drm/xe/oa: Allow reading after disabling OA stream
b7a629d07908b drm/amdgpu: apply state adjust rules to some additional HAINAN vairants
0285fc016a4fb drm/radeon: apply state adjust rules to some additional HAINAN vairants
f99e8b813ae5c drm/imagination: Fix deadlock in soft reset sequence
5af0510112313 drm/amdgpu/mmhub4.1.0: add bounds checking for cid
d23171e11a220 drm/amdgpu/mmhub3.0: add bounds checking for cid
76b0c2e88d1a2 drm/amdgpu/mmhub3.0.2: add bounds checking for cid
2acb07d01c435 drm/amdgpu/mmhub3.0.1: add bounds checking for cid
3ca77111881c4 drm/amdgpu/mmhub2.3: add bounds checking for cid
5b53680ff3f3d drm/amdgpu/mmhub2.0: add bounds checking for cid
04a789b30b002 drm/amdgpu/gmc9.0: add bounds checking for cid
68b2678c5f85e drm/amd/display: Wrap dcn32_override_min_req_memclk() in DC_FP_{START, END}
7e3ec3bf40151 drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug
0866809dfe19d io_uring/kbuf: propagate BUF_MORE through early buffer commit path
04d57b332e37b serial: uartlite: fix PM runtime usage count underflow on probe
0bae1c670aa8c serial: 8250: Add late synchronize_irq() to shutdown to handle DW UART BUSY
2a72403b985ae serial: 8250: Fix TX deadlock when using DMA
868b44e2f6467 serial: 8250_pci: add support for the AX99100
31fd1e0281621 iommu/vt-d: Fix intel iommu iotlb sync hardlockup and retry
2025b2d1f9d5c mtd: Avoid boot crash in RedBoot partition table parser
0643441d70234 mtd: rawnand: cadence: Fix error check for dma_alloc_coherent() in cadence_nand_init()
c96bae994552c mtd: rawnand: pl353: make sure optimal timings are applied
df30056c78e8b spi: fix statistics allocation
afe27c1f43aa5 spi: fix use-after-free on controller registration failure
ea4fa54b83bb2 pmdomain: bcm: bcm2835-power: Increase ASB control timeout
45fd9d8352f22 mmc: sdhci: fix timing selection for 1-bit bus width
570bbd5264897 mmc: sdhci-pci-gli: fix GL9750 DMA write corruption
26760c3382d26 ata: libata-core: disable LPM on ADATA SU680 SSD
2ee1064926d33 net: macb: Reinitialize tx/rx queue pointer registers and rx ring during resume
f1cf6177b2304 net: macb: Introduce gem_init_rx_ring()
6e40ebb999c2c batman-adv: avoid OGM aggregation when skb tailroom is insufficient
e3d8efc157bc5 btrfs: fix transaction abort when snapshotting received subvolumes
4998dac563257 kprobes: Remove unneeded warnings from __arm_kprobe_ftrace()
7838880e78fd3 kprobes: Remove unneeded goto
c75bdffc07599 powerpc64/bpf: fix kfunc call support
a87072464ebb6 powerpc64/bpf: Fold bpf_jit_emit_func_call_hlp() into bpf_jit_emit_func_call_rel()
cd3215d74b323 s390/zcrypt: Enable AUTOSEL_DOM for CCA serialnr sysfs attribute
1ec7d3c7dc8f2 drm/i915/psr: Write DSC parameters on Selective Update in ET mode
5329d725add8a drm/i915/dsc: Add helper for writing DSC Selective Update ET parameters
182d342b111f3 drm/i915/dsc: Add Selective Update register definitions
ce00616bc1df6 ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION
89afe5e2dbea6 ksmbd: unset conn->binding on failed binding request
d33cbf0bf8979 smb: client: fix krb5 mount with username option
9aeacde4da0f0 Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access
d90150c72d2e6 Bluetooth: L2CAP: Fix type confusion in l2cap_ecred_reconf_rsp()
65c25b588994d mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations
d646b038baea3 parisc: Flush correct cache in cacheflush() syscall
0bb848d8c6493 net: macb: fix use-after-free access to PTP clock
548a1bfe59136 NFC: nxp-nci: allow GPIOs to sleep
2970f0f4e7da7 LoongArch: Give more information if kmem access failed
2c638259ad750 nvdimm/bus: Fix potential use after free in asynchronous initialization
301670dcd098c sunrpc: fix cache_request leak in cache_release
d6efaa50af62f HID: bpf: prevent buffer overflow in hid_hw_request
9cd1005cecfcc selftests/hid: fix compilation when bpf_wq and hid_device are not exported
dad0c3c0a8e5d nfsd: fix heap overflow in NFSv4.0 LOCK replay cache
e3d77f935639e NFSD: Hold net reference for the lifetime of /proc/fs/nfs/exports fd
0479268fdfaaf drm/amdgpu: Add basic validation for RAS header
0ea986a1cebae drm/amd/pm: Use pm_display_cfg in legacy DPM (v2)
c179bece52fd2 drm/amd/display: Add pixel_clock to amd_pp_display_configuration
b0e9965cebf9f drm/i915/psr: Repeat Selective Update area alignment
bc4a6620e4243 drm/i915/alpm: ALPM disable fixes
c962bdcd24b49 s390/xor: Fix xor_xc_2() inline assembly constraints
6949c35ef26e4 s390/stackleak: Fix __stackleak_poison() inline assembly constraint
d2fc2dcfce47a sched/fair: Fix zero_vruntime tracking
f3fb54e7a8b4a io_uring/kbuf: check if target buffer list is still legacy on recycle
cc095cd305fdd sched_ext: Remove redundant css_put() in scx_cgroup_init()
08de46a75f91a mm: thp: deny THP for files on anonymous inodes
ad07ea069f924 erofs: fix inline data read failure for ztailpacking pclusters
695455fbc4905 xfs: get rid of the xchk_xfile_*_descr calls
6cce7bc7fac84 binfmt_misc: restore write access before closing files opened by open_exec()
b358fc6ff3b35 net: dsa: properly keep track of conduit reference
fc023b8fab057 dmaengine: mmp_pdma: Fix race condition in mmp_pdma_residue()
7b4bfd02c934d blk-throttle: fix access race during throttle policy activation
25d2dc669f2a7 f2fs: fix to avoid migrating empty section
cc81768212cdc f2fs: compress: fix UAF of f2fs_inode_info in f2fs_free_dic
7c002e242ddd0 f2fs: compress: change the first parameter of page_array_{alloc,free} to sbi
cd19a32de5d05 net: stmmac: remove support for lpi_intr_o
7c1d221e475e3 mptcp: pm: in-kernel: always set ID as avail when rm endp
996092ba6df66 platform/x86/amd/pmc: Add support for Van Gogh SoC
5844e21800dc2 x86/uprobes: Fix XOL allocation failure for 32-bit tasks
55a88ab8a1314 io_uring/uring_cmd: fix too strict requirement on ioctl
079050a23de6b Octeontx2-af: Add proper checks for fwdata
19e18e6dabb1b tracing: Add recursion protection in kernel stack trace recording
8ac7dd0f813fb ice: fix devlink reload call trace
0c3666ec18864 btrfs: do not strictly require dirty metadata threshold for metadata writepages
cf969bddd6e69 rxrpc: Fix recvmsg() unconditional requeue
4220cb3740691 dm-verity: disable recursive forward error correction
bd0905e2122e3 ipv6: use RCU in ip6_xmit()
91c228f96fcfa drm/xe/sync: Cleanup partially initialized sync on parse failure
3729fd784d156 xfs: fix integer overflow in bmap intent sort comparator
1ab70c260cf16 crypto: atmel-sha204a - Fix OOM ->tfm_count leak
0e4b8faaaebe3 cifs: open files should not hold ref on superblock
88f974fe118cb net: macb: Shuffle the tx ring before enabling tx
c20b47ae4f4dd drm/bridge: ti-sn65dsi83: halve horizontal syncs for dual LVDS output
3fe2d9ec166b7 ksmbd: Don't log keys in SMB3 signing and encryption key generation
60fe02840272d KVM: x86: Introduce KVM_X86_QUIRK_VMCS12_ALLOW_FREEZE_IN_SMM
0e729a5368925 KVM: nVMX: Add consistency checks for CR0.WP and CR4.CET
4055f250a3294 KVM: x86: Introduce Intel specific quirk KVM_X86_QUIRK_IGNORE_GUEST_PAT
18fd5e4bcf04d KVM: x86: Introduce supported_quirks to block disabling quirks
541304df9d989 KVM: x86: Allow vendor code to disable quirks
70bc291dcc804 KVM: x86: do not allow re-enabling quirks
d3e2196c3e534 KVM: x86: Quirk initialization of feature MSRs to KVM's max configuration
715b07abac522 KVM: x86: Co-locate initialization of feature MSRs in kvm_arch_vcpu_create()
5bc7aeb75b65e fgraph: Fix thresh_return clear per-task notrace
2ca7125fff6bb iomap: reject delalloc mappings during writeback
e0b14bf06393b sched_ext: Fix starvation of scx_enable() under fair-class saturation
41423912f7ac7 sched_ext: Disable preemption between scx_claim_exit() and kicking helper work
3376b345df155 nsfs: tighten permission checks for ns iteration ioctls
fe8b548fb40da mm/kfence: fix KASAN hardware tag faults during late enablement
e305204d7a5a8 mm/page_alloc: forward the gfp flags from alloc_contig_range() to post_alloc_hook()
05634a14e7437 mm/page_alloc: sort out the alloc_contig_range() gfp flags mess
9287df8de02e6 mm/page_alloc: move set_page_refcounted() to callers of post_alloc_hook()
a10b3c5dec40e mmc: dw_mmc-rockchip: Fix runtime PM support for internal phase support
7457b35afafef mmc: dw_mmc-rockchip: Add memory clock auto-gating support
bcb599684ef14 mmc: dw_mmc-rockchip: use modern PM macros
01651e7751edb KVM: SVM: Set/clear CR8 write interception when AVIC is (de)activated
04898c16f1bca KVM: SVM: Add a helper to look up the max physical ID for AVIC
eb78f67f94d0e KVM: SVM: Limit AVIC physical max index based on configured max_vcpu_ids
f962ca3b020e1 usb: gadget: f_tcm: Fix NULL pointer dereferences in nexus handling
93f116c3393a2 usb: gadget: f_ncm: Fix net_device lifecycle with device_move
b1e8c177c033b cleanup: Provide retain_and_null_ptr()
88ced0d1aa62f can: gs_usb: gs_can_open(): always configure bitrates before starting device
970e13ead0a1e xfs: Fix error pointer dereference
035d0d09d5ab3 net/sched: act_gate: snapshot parameters with RCU on replace
03a072e0fbf99 kbuild: Leave objtool binary around with 'make clean'
a60307872a2e3 selftests: mptcp: join: check RM_ADDR not sent over same subflow
f6429557edd01 selftests: mptcp: add a check for 'add_addr_accepted'
27c9acbb9c81f drm/amd/display: Use GFP_ATOMIC in dc_create_stream_for_sink
5299c355c0921 mptcp: pm: avoid sending RM_ADDR over same subflow
67f34ab318807 mptcp: pm: in-kernel: always mark signal+subflow endp as used
3bc5856bd458b perf/x86/intel/uncore: Add per-scheduler IMC CAS count events
4597b9243fcce perf/x86/intel/uncore: Support more units on Granite Rapids
d0155fe68f31b wifi: libertas: fix use-after-free in lbs_free_adapter()
0b6e86e18c354 platform/x86: hp-bioscfg: Support allocations of larger data
99e7b48c03972 x86/sev: Allow IBPB-on-Entry feature for SNP guests
241cd64cf2e32 net: phy: register phy led_triggers during probe to avoid AB-BA deadlock
c171f90f58974 gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL
65ed52200080e spi: cadence-quadspi: Implement refcount to handle unbind during busy
34d6691933682 ksmbd: call ksmbd_vfs_kern_path_end_removing() on some error paths
f24a52948c95e dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list()
7955a914cf935 smb: client: Compare MACs in constant time
2cdc56ed67615 ksmbd: Compare MACs in constant time
02669e2a4d207 net/tcp-md5: Fix MAC comparison to be constant-time
43515d1d4d826 drm/bridge: ti-sn65dsi86: Add support for DisplayPort mode with HPD
d7159817b9f36 i3c: mipi-i3c-hci: Add missing TID field to no-op command descriptor
bc729067d180a i3c: mipi-i3c-hci: Restart DMA ring correctly after dequeue abort
5775296df3cc2 i3c: mipi-i3c-hci: Use ETIMEDOUT instead of ETIME for timeout errors
451ec5e67444f iio: proximity: hx9023s: Protect against division by zero in set_samp_freq
b776df251da87 iio: imu: inv_icm42600: fix odr switch when turning buffer off
1d9243d418153 iio: imu: inv_icm42600: fix odr switch to the same value
65932eadd9596 iio: gyro: mpu3050-i2c: fix pm_runtime error handling
66c0d1d600e7b iio: gyro: mpu3050-core: fix pm_runtime error handling
52b56f4377b78 iio: buffer: Fix wait_queue not being removed
3b99983617f9b iio: chemical: bme680: Fix measurement wait duration calculation
bb99fac138b49 iio: potentiometer: mcp4131: fix double application of wiper shift
2a4d111a6a34a iio: chemical: sps30_i2c: fix buffer size in sps30_i2c_read_meas()
154a37c0d475a iio: chemical: sps30_serial: fix buffer size in sps30_serial_read_meas()
6bef4094e3c84 iio: frequency: adf4377: Fix duplicated soft reset mask
d67832dc1dc96 iio: dac: ds4424: reject -128 RAW value
05d064e3633f3 btrfs: abort transaction on failure to update root in the received subvol ioctl
2e57b8cac2ba0 btrfs: fix transaction abort on set received ioctl due to item overflow
5e2ea10b800d1 btrfs: fix transaction abort on file creation due to name hash collision
7874947057851 smb: client: fix iface port assignment in parse_server_interfaces
52327268224fb smb: client: fix in-place encryption corruption in SMB2_write()
b8dda19e36b1e smb: client: fix atomic open with O_DIRECT & O_SYNC
ab10bf1645618 lib/bootconfig: check bounds before writing in __xbc_open_brace()
197c3716937ba lib/bootconfig: fix snprintf truncation check in xbc_node_compose_key_after()
1a85f84214f9d x86/apic: Disable x2apic on resume if the kernel expects so
2cb75e66b6f0c scsi: core: Fix error handling for scsi_alloc_sdev()
6a1b45a06880a lib/bootconfig: fix off-by-one in xbc_verify_tree() unclosed brace error
b9f26a4b7f821 s390/dasd: Copy detected format information to secondary device
6413c7d2f71ef s390/dasd: Move quiesce state with pprc swap
db353ade50dc3 xfs: ensure dquot item is deleted from AIL only after log shutdown
e88ce9f0536f3 xfs: fix undersized l_iclog_roundoff values
2705ca90792b9 xfs: fix returned valued from xfs_defer_can_append
72a0bb8de73a7 cifs: make default value of retrans as zero
f54fff845e469 qmi_wwan: allow max_mtu above hard_mtu to control rx_urb_size
06722ffc58135 tracing: Fix trace_buf_size= cmdline parameter with sizes >= 2G
a8f96f00edcd2 tracing: Fix enabling multiple events on the kernel command line and bootconfig
d34bc6eef9c5d drm/msm: Fix dma_free_attrs() buffer size
1c956f0fccc26 drm/i915: Fix potential overflow of shmem scatterlist length
3133acd82556a drm/bridge: ti-sn65dsi83: fix CHA_DSI_CLK_RANGE rounding
01c82133e226f drm/amd: Set num IP blocks to 0 if discovery fails
904025fa8bba1 drm/amdgpu: Fix use-after-free race in VM acquire
a8de25f00bbf7 drm/amd/pm: remove invalid gpu_metrics.energy_accumulator on smu v13.0.x
e80fef36c676c net: dsa: microchip: Fix error path in PTP IRQ setup
d0f2386f52980 net: ethernet: arc: emac: quiesce interrupts before requesting IRQ
553366c271479 net: ncsi: fix skb leak in error paths
abf4feaee6405 net: nexthop: fix percpu use-after-free in remove_nh_grp_entry
08aa9f3c8cf4d ksmbd: fix use-after-free by using call_rcu() for oplock_info
54b48ae83de8b smb: server: fix use-after-free in smb2_open()
960699317d39f ksmbd: fix use-after-free in smb_lazy_parent_lease_break_close()
7abf59e1852ed drm/amd/display: Fallback to boot snapshot for dispclk
f897b72cc74d2 ata: libata-core: Disable LPM on ST1000DM010-2EP102
6b36695f5ec50 pmdomain: bcm: bcm2835-power: Fix broken reset status read
540e52dcf225a parisc: Check kernel mapping earlier at bootup
05d239f2c95e6 arm64: contpte: fix set_access_flags() no-op check for SMMU/ATS faults
7d1f55d8799a9 parisc: Fix initial page table creation for boot
b48a0f8d4541a hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read
ab67221a6fdaf arm64: mm: Add PTE_DIRTY back to PAGE_KERNEL* to fix kexec/hibernation
6bdd2d70c338d nouveau/dpcd: return EBUSY for aux xfer if the device is asleep
ce8ef2be6ae81 parisc: Increase initial mapping to 64 MB with KALLSYMS
b7e5d8ddfdf1d batman-adv: Avoid double-rtnl_lock ELP metric worker
8be6ed64966da net/tcp-ao: Fix MAC comparison to be constant-time
c2bbdee7650ca tracing: Fix syscall events activation by ensuring refcount hits zero
efd959809cf6f ice: fix retry for AQ command 0x06EE
065783d651492 net: mana: Ring doorbell at 4 CQ wraparounds
145e50c2c700f media: dvb-net: fix OOB access in ULE extension header tables
e14a1148f02e8 staging: rtl8723bs: fix potential out-of-bounds read in rtw_restruct_wmm_ie
821f7d759fb2d staging: rtl8723bs: properly validate the data in rtw_get_ie_ex()
27694ccbd8398 ixgbevf: fix link setup issue
0709748234159 ice: reintroduce retry mechanism for indirect AQ
0e4aaf5a3212b btrfs: fix chunk map leak in btrfs_map_block() after btrfs_chunk_map_num_copies()
bb19587205443 irqchip/gic-v3-its: Limit number of per-device MSIs to the range the ITS supports
64dc258f9eec1 device property: Allow secondary lookup in fwnode_get_next_child_node()
02e87ec0bc706 nfsd: Fix cred ref leak in nfsd_nl_listener_set_doit().
854f926195762 s390/pfault: Fix virtual vs physical address confusion
22d1abf8f5250 drm/bridge: ti-sn65dsi86: Enable HPD polling if IRQ is not used
0b07f7d2c5a40 drm/bridge: samsung-dsim: Fix memory leak in error path
bde8659d8b51f drm/amd: Disable MES LR compute W/A
655d719aadbb8 Revert "tcpm: allow looking for role_sw device in the main node"
07faa2aaa6984 Fix CC_HAS_ASM_GOTO_OUTPUT on non-x86 architectures
391983c9118ea kbuild: Disable CC_HAS_ASM_GOTO_OUTPUT on clang < 17
40119a21d9769 scsi: hisi_sas: Fix NULL pointer exception during user_scan()
393763830ec84 scsi: hisi_sas: Use macro instead of magic number
890bcf9ef90ea scsi: hisi_sas: Add time interval between two H2D FIS following soft reset spec
2fcc2fc21cae7 scsi: ufs: core: Fix SError in ufshcd_rtc_work() during UFS suspend
980f18d058049 i3c: dw-i3c-master: Set SIR_REJECT in DAT on device attach and reattach
8ee08589549c2 time/jiffies: Mark jiffies_64_to_clock_t() notrace
5895d0164c84d ceph: fix memory leaks in ceph_mdsc_build_path()
aedd29386b23f ceph: fix i_nlink underrun during async unlink
f35736a3ae736 libceph: admit message frames only in CEPH_CON_S_OPEN state
b268984ae88cb libceph: Use u32 for non-negative values in ceph_monmap_decode()
dbd857a9e1e33 libceph: prevent potential out-of-bounds reads in process_message_header()
27a2a3c26ed30 libceph: reject preamble if control segment is empty
ed024d2f4c79c libceph: Fix potential out-of-bounds access in ceph_handle_auth_reply()
644b47f0574fd ceph: add a bunch of missing ceph_path_info initializers
b0ca81616a010 kprobes: avoid crash when rmmod/insmod after ftrace killed
c2ebfbe63deb7 tipc: fix divide-by-zero in tipc_sk_filter_connect()
0da170b9e600d ASoC: qcom: qdsp6: Fix q6apm remove ordering during ADSP stop and start
45038e03f15e9 mmc: core: Avoid bitfield RMW for claim/retune flags
44520da00f6b2 mm/kfence: disable KFENCE upon KASAN HW tags enablement
590f8a4ad46c0 mmc: mmci: Fix device_node reference leak in of_get_dml_pipe_index()
b07fc09a226c7 mm/tracing: rss_stat: ensure curr is false from kthread context
19a44efe43fec rust: kbuild: allow `unused_features`
d4a400a6a4c4d usb: image: mdc800: kill download URB on timeout
7003be7a51189 usb: mdc800: handle signal and read racing
6287e0c01ccb8 usb: renesas_usbhs: fix use-after-free in ISR during device removal
276aef0fd2b92 usb: class: cdc-wdm: fix reordering issue in read code path
24b31a227f679 USB: core: Limit the length of unkillable synchronous timeouts
0535f84cb94c9 USB: usbtmc: Use usb_bulk_msg_killable() with user-specified timeouts
53ab34d522e50 USB: usbcore: Introduce usb_bulk_msg_killable()
5b561fabe682e usb: typec: altmode/displayport: set displayport signaling rate in configure message
ed8c19af08423 usb: roles: get usb role switch from parent only for usb-b-connector
c8eb4016c2571 usb: cdc-acm: Restore CAP_BRK functionnality to CH343
f43e86c19101c usb: core: don't power off roothub PHYs if phy_set_mode() fails
78aae91d7db26 usb: misc: uss720: properly clean up reference in uss720_probe()
5df5ce0cac6c2 usb: dwc3: pci: add support for the Intel Nova Lake -H
3cec135415a89 usb: yurex: fix race in probe
6f91f3f087194 usb: xhci: Prevent interrupt storm on host controller error (HCE)
807e4fb5140c7 usb: xhci: Fix memory leak in xhci_disable_slot()
015af103c06cb USB: ezcap401 needs USB_QUIRK_NO_BOS to function on 10gbs usb speed
eb07da446ad97 usb/core/quirks: Add Huawei ME906S-device to wakeup quirk
41f33bd77bb51 USB: add QUIRK_NO_BOS for video capture several devices
43cbfb3bd6042 KVM: SVM: Initialize AVIC VMCB fields if AVIC is enabled with in-kernel APIC
fe1c92383a771 ASoC: amd: yc: Add DMI quirk for ASUS EXPERTBOOK PM1503CDA
84e39ec13122b ata: libata-core: Add BRIDGE_OK quirk for QEMU drives
9037a536df46e net: usb: lan78xx: skip LTM configuration for LAN7850
cab4d982de09d net: usb: lan78xx: fix TX byte statistics for small packets
b46d769ab2a05 net: usb: lan78xx: fix silent drop of packets with checksum errors
b267255c15d2a ALSA: usb-audio: Check endpoint numbers at parsing Scarlett2 mixer interfaces
ae8f8d30d334b ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain()
9cca530c7cc1b cgroup: fix race between task migration and iteration
ba76b18d8d2c8 Revert "arm64: dts: qcom: sdm845-oneplus: Mark l14a regulator as boot-on"
228b379363761 usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks()
e4c887b673ec4 iio: imu: inv-mpu9150: fix irq ack preventing irq storms
1ecc39dc8cdc3 net: prevent NULL deref in ip[6]tunnel_xmit()
357fc9f07dbc3 octeontx2-af: devlink: fix NIX RAS reporter to use RAS interrupt status
ad403c9607eb0 octeontx2-af: devlink: fix NIX RAS reporter recovery condition
f18640b9236ea net: dsa: realtek: Fix LED group port bit for non-zero LED group
c78f01abe5358 net: bonding: Fix nd_tbl NULL dereference when IPv6 is disabled
781110700ada2 drm/amdkfd: Unreserve bo if queue update failed
5f8d1ed366d86 ASoC: detect empty DMI strings
33de168afdd57 ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition
2ca9da563a5fc ACPI: OSL: fix __iomem type on return from acpi_os_map_generic_address()
dd8ac1017b3c2 net: bcmgenet: fix broken EEE by converting to phylib-managed state
fa5ba9867a55e e1000/e1000e: Fix leak in DMA error cleanup
5f205d2d640c8 i40e: fix src IP mask checks and memcpy argument names in cloud filter
843e913cef4e3 nvme-pci: Fix race bug in nvme_poll_irqdisable()
50bad78f03a02 nvme-pci: Fix slab-out-of-bounds in nvme_dbbuf_set
8d770de29989c sched: idle: Make skipping governor callbacks more consistent
6d9fc17dce6a2 perf ftrace: Fix hashmap__new() error checking
baefa11ec8dc4 regulator: pca9450: Correct interrupt type
61e1a600338fc perf annotate: Fix hashmap__new() error checking
5e7ece24c5cb7 netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels
894c5780ddadd netfilter: nfnetlink_cthelper: fix OOB read in nfnl_cthelper_dump_table()
cf4a4df38d174 netfilter: nfnetlink_queue: fix entry leak in bridge verdict error path
5b18b8b35c7cd netfilter: x_tables: guard option walkers against 1-byte tail reads
dfbdac7191987 netfilter: nft_set_pipapo: fix stack out-of-bounds read in pipapo_drop()
eb0948fa13298 netfilter: nf_tables: always walk all pending catchall elements
834c4f645726a net: add xmit recursion limit to tunnel xmit functions
0d070be560e6e xdp: register system page pool as an XDP memory model
2b1c64db6934f xdp: allow attaching already registered memory model to xdp_rxq_info
4f9c20113f87d amd-xgbe: prevent CRC errors during RX adaptation with AN disabled
9285fe46130ca amd-xgbe: fix link status handling in xgbe_rx_adaptation
0695712f3a6f1 mctp: route: hold key->lock in mctp_flow_prepare_output()
9baf26a91565b bonding: fix type confusion in bond_setup_by_slave()
c8d250e0a8d61 bonding: use common function to compute the features
744c03df1002f net: add a common function to compute features for upper devices
00ed3c3ade696 bonding: Correctly support GSO ESP offload
999fed0236754 bonding: add ESP offload features when slaves support
cde0bccc67739 can: hi311x: hi3110_open(): add check for hi3110_power_enable() return value
9f81be2ab9d8e mctp: i2c: fix skb memory leak in receive path
acf162d8d7e91 bnxt_en: Fix RSS table size check when changing ethtool channels
27e43356d0def serial: caif: hold tty->link reference in ldisc_open and ser_release
bbdf6d378e1dd net: sfp: improve Huawei MA5671a fixup
7dcf2de716560 ASoC: simple-card-utils: fix graph_util_is_ports0() for DT overlays
142a386a80580 ASoC: simple-card-utils: use __free(device_node) for device node
eab71e11ce244 ASoC: soc-core: flush delayed work before removing DAIs and widgets
b467eb43b5e98 ASoC: soc-core: drop delayed_work_pending() check before flush
3e41ae3fddcb7 drm/sitronix/st7586: fix bad pixel data due to byte swap
81a43e8005366 net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit
9c5ee9b981ee0 net/mlx5e: Fix DMA FIFO desync on error CQE SQ recovery
05c9a6df3646c net/mlx5: Fix crash when moving to switchdev mode
3c7313cb41b1b net/mlx5: Fix deadlock between devlink lock and esw->wq
d7079f496a790 net/mlx5: Query to see if host PF is disabled
752e14738479c net/mlx5: IFC updates for disabled host PF
eb9af3de556db bonding: handle BOND_LINK_FAIL, BOND_LINK_BACK as valid link states
9bd8c7a11c4ca drm/amd/pm: add missing od setting PP_OD_FEATURE_ZERO_FAN_BIT for smu v14
06a6e2d3c57b9 drm/msm/dsi: fix pclk rate calculation for bonded dsi
5a16ae6e3f174 net: dsa: realtek: rtl8365mb: remove ifOutDiscards from rx_packets
955387df028de perf disasm: Fix off-by-one bug in outside check
9937423c6647e workqueue: Use POOL_BH instead of WQ_BH when checking pool flags
c1c08fd42a8ff btrfs: hold space_info->lock when clearing periodic reclaim ready
49f53ee4e2529 xprtrdma: Decrement re_receiving on the early exit paths
275dc9f8bc3c1 drm/msm/dsi: fix hdisplay calculation when programming dsi registers
7e2963773760a nfs: return EISDIR on nfs3_proc_create if d_alias is a dir
d1e8b015bc621 smb/server: Fix another refcount leak in smb2_open()
ca235eac5b3af powerpc: 83xx: km83xx: Fix keymile vendor prefix
a8e66eed84608 remoteproc: mediatek: Unprepare SCP clock during system suspend
ae48ed8c39686 remoteproc: sysmon: Correct subsys_name_len type in QMI request
631b7e154e58c powerpc/crash: adjust the elfcorehdr size
b273e3a1b9ef3 powerpc/kexec/core: use big-endian types for crash variables
c65c6ee4c56c5 kexec: Include kernel-end even without crashkernel
60331e09173fc kexec: Consolidate machine_kexec_mask_interrupts() implementation
7a03422aa3b47 powerpc/uaccess: Fix inline assembly for clang build on PPC32
394d89cf4626b ALSA: usb-audio: Check max frame size for implicit feedback mode, too
09927231a257f drm/amdgpu/vcn5: Add SMU dpm interface type
314f1b873862e ALSA: usb-audio: Avoid implicit feedback mode on DIYINHK USB Audio 2.0
6557af8245c07 scsi: ufs: core: Fix shift out of bounds when MAXQ=32
be730f9ee92ae scsi: ufs: core: Fix possible NULL pointer dereference in ufshcd_add_command_trace()
f1d4b894076f4 ASoC: cs42l43: Report insert for exotic peripherals
20232d7bec4e5 ASoC: amd: yc: Add ASUS EXPERTBOOK BM1503CDA to quirk table
af95b5735c822 scsi: ses: Fix devices attaching to different hosts
c66c957bb7d2f ACPI: OSI: Add DMI quirk for Acer Aspire One D255
662d9f6d25d03 wifi: mac80211: set default WMM parameters on all links
aa9ebc084505f unshare: fix unshare_fs() handling
fe1dafba72ce4 ALSA: hda/realtek: Fix speaker pop on Star Labs StarFighter
78d3f201f8b60 scsi: mpi3mr: Add NULL checks when resetting request and reply queues
81b0e0276f5fe ACPI: PM: Save NVS memory on Lenovo G70-35
f8db760f4f52a scsi: storvsc: Fix scheduling while atomic on PREEMPT_RT
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/linux-yocto-rt_6.12.bb | 6 ++--
.../linux/linux-yocto-tiny_6.12.bb | 6 ++--
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++----------
3 files changed, 20 insertions(+), 20 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
index dd906d5ac6..609f2eaefb 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
@@ -15,13 +15,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "d684a294eb3f7a4122771290905565ddc36efd45"
-SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799"
+SRCREV_machine ?= "7e842d87b9b4b32c87ffa1eff0923050b2fb4579"
+SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
-LINUX_VERSION ?= "6.12.77"
+LINUX_VERSION ?= "6.12.79"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
index 2803d0215a..2cd5b510d9 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
@@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc
include recipes-kernel/linux/cve-exclusion.inc
include recipes-kernel/linux/cve-exclusion_6.12.inc
-LINUX_VERSION ?= "6.12.77"
+LINUX_VERSION ?= "6.12.79"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
-SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799"
+SRCREV_machine ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
+SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479"
PV = "${LINUX_VERSION}+git"
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
index 294431f5dd..7b34f33272 100644
--- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
@@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base"
KBRANCH:qemuloongarch64 ?= "v6.12/standard/base"
KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "448ef862c891700b3d94201e63a831b34a7713e4"
-SRCREV_machine:qemuarm64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
-SRCREV_machine:qemuloongarch64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
-SRCREV_machine:qemumips ?= "794aa4ace83aa50352e4abc39ed84229c864310c"
-SRCREV_machine:qemuppc ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
-SRCREV_machine:qemuriscv64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
-SRCREV_machine:qemuriscv32 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
-SRCREV_machine:qemux86 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
-SRCREV_machine:qemux86-64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
-SRCREV_machine:qemumips64 ?= "3b21c90c913a00a52877a25a4cd1aff57fc14695"
-SRCREV_machine ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3"
-SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799"
+SRCREV_machine:qemuarm ?= "bdecc68b604a59ee8f0bde1b96240d48938009c2"
+SRCREV_machine:qemuarm64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
+SRCREV_machine:qemuloongarch64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
+SRCREV_machine:qemumips ?= "0f5e1025c5fe2f07e5e64dca977e10f4d42389db"
+SRCREV_machine:qemuppc ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
+SRCREV_machine:qemuriscv64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
+SRCREV_machine:qemuriscv32 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
+SRCREV_machine:qemux86 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
+SRCREV_machine:qemux86-64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
+SRCREV_machine:qemumips64 ?= "b1f97d0b31600bbbf29d4b9e519bca2a7104a2b4"
+SRCREV_machine ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
+SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "6f232446a62980e51f537db1c655e686d869b9ed"
+SRCREV_machine:class-devupstream ?= "c2d104a355013a14bcd73e31fb2c4bc21922115a"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v6.12/base"
@@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "6.12.77"
+LINUX_VERSION ?= "6.12.79"
PV = "${LINUX_VERSION}+git"
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 12/18] linux-yocto/6.12: update CVE exclusions (6.12.79)
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (10 preceding siblings ...)
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 11/18] linux-yocto/6.12: update to v6.12.79 bruce.ashfield
@ 2026-04-23 15:45 ` bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 13/18] linux-yocto/6.12: update to v6.12.80 bruce.ashfield
` (6 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 55 changes (8 new | 47 updated): - 8 new CVEs: CVE-2026-33044, CVE-2026-33045, CVE-2026-33654, CVE-2026-33739, CVE-2026-33765, CVE-2026-33868, CVE-2026-34205, CVE-2026-34475 - 47 updated CVEs: CVE-2022-2713, CVE-2023-7340, CVE-2025-15612, CVE-2025-15615, CVE-2025-15616, CVE-2025-15617, CVE-2025-4393, CVE-2025-4394, CVE-2025-53521, CVE-2025-59028, CVE-2025-59031, CVE-2025-59032, CVE-2025-67030, CVE-2025-70887, CVE-2026-0394, CVE-2026-1556, CVE-2026-20670, CVE-2026-20692, CVE-2026-22738, CVE-2026-22742, CVE-2026-22743, CVE-2026-22744, CVE-2026-24031, CVE-2026-27855, CVE-2026-28831, CVE-2026-28867, CVE-2026-28870, CVE-2026-28871, CVE-2026-28892, CVE-2026-28893, CVE-2026-29055, CVE-2026-2436, CVE-2026-2485, CVE-2026-30304, CVE-2026-30587, CVE-2026-32859, CVE-2026-33366, CVE-2026-33529, CVE-2026-33531, CVE-2026-33537, CVE-2026-33559, CVE-2026-3098, CVE-2026-3622, CVE-2026-3650, CVE-2026-4346, CVE-2026-4926, CVE-2026-4982
Date: Fri, 27 Mar 2026 19:52:09 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/cve-exclusion_6.12.inc | 376 ++++++++++++++++--
1 file changed, 350 insertions(+), 26 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index 5fa3966719..bba789c9e5 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2026-03-17 19:07:54.629545+00:00 for kernel version 6.12.77
-# From linux_kernel_cves cve_2026-03-17_1800Z-2-g4ae4487ca91
+# Generated at 2026-03-27 19:55:47.691205+00:00 for kernel version 6.12.79
+# From linux_kernel_cves cve_2026-03-27_1900Z-2-gb6d5823e23a
python check_kernel_cve_status_version() {
- this_version = "6.12.77"
+ this_version = "6.12.79"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -2770,8 +2770,6 @@ CVE_STATUS[CVE-2022-49265] = "fixed-version: Fixed from version 5.18"
CVE_STATUS[CVE-2022-49266] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2022-49267] = "fixed-version: Fixed from version 5.18"
-
CVE_STATUS[CVE-2022-49268] = "fixed-version: Fixed from version 5.18"
CVE_STATUS[CVE-2022-49269] = "fixed-version: Fixed from version 5.18"
@@ -9916,8 +9914,6 @@ CVE_STATUS[CVE-2024-27040] = "fixed-version: Fixed from version 6.9"
CVE_STATUS[CVE-2024-27041] = "fixed-version: Fixed from version 6.9"
-CVE_STATUS[CVE-2024-27042] = "fixed-version: Fixed from version 6.9"
-
CVE_STATUS[CVE-2024-27043] = "fixed-version: Fixed from version 6.9"
CVE_STATUS[CVE-2024-27044] = "fixed-version: Fixed from version 6.9"
@@ -17552,7 +17548,7 @@ CVE_STATUS[CVE-2025-38424] = "cpe-stable-backport: Backported in 6.12.35"
CVE_STATUS[CVE-2025-38425] = "cpe-stable-backport: Backported in 6.12.35"
-# CVE-2025-38426 needs backporting (fixed from 6.16)
+CVE_STATUS[CVE-2025-38426] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2025-38427] = "cpe-stable-backport: Backported in 6.12.35"
@@ -17950,7 +17946,7 @@ CVE_STATUS[CVE-2025-38625] = "cpe-stable-backport: Backported in 6.12.42"
CVE_STATUS[CVE-2025-38626] = "cpe-stable-backport: Backported in 6.12.42"
-# CVE-2025-38627 needs backporting (fixed from 6.17)
+CVE_STATUS[CVE-2025-38627] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2025-38628] = "cpe-stable-backport: Backported in 6.12.42"
@@ -18352,7 +18348,7 @@ CVE_STATUS[CVE-2025-39761] = "cpe-stable-backport: Backported in 6.12.43"
CVE_STATUS[CVE-2025-39763] = "cpe-stable-backport: Backported in 6.12.43"
-# CVE-2025-39764 needs backporting (fixed from 6.17)
+CVE_STATUS[CVE-2025-39764] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2025-39765] = "cpe-stable-backport: Backported in 6.12.44"
@@ -18828,7 +18824,7 @@ CVE_STATUS[CVE-2025-40003] = "cpe-stable-backport: Backported in 6.12.54"
CVE_STATUS[CVE-2025-40004] = "cpe-stable-backport: Backported in 6.12.53"
-# CVE-2025-40005 needs backporting (fixed from 6.17)
+CVE_STATUS[CVE-2025-40005] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2025-40006] = "cpe-stable-backport: Backported in 6.12.50"
@@ -19086,7 +19082,7 @@ CVE_STATUS[CVE-2025-40133] = "cpe-stable-backport: Backported in 6.12.55"
CVE_STATUS[CVE-2025-40134] = "cpe-stable-backport: Backported in 6.12.53"
-# CVE-2025-40135 needs backporting (fixed from 6.18)
+CVE_STATUS[CVE-2025-40135] = "cpe-stable-backport: Backported in 6.12.78"
# CVE-2025-40136 needs backporting (fixed from 6.18)
@@ -19108,13 +19104,13 @@ CVE_STATUS[CVE-2025-40145] = "fixed-version: only affects 6.15 onwards"
# CVE-2025-40146 needs backporting (fixed from 6.18)
-# CVE-2025-40147 needs backporting (fixed from 6.18)
+CVE_STATUS[CVE-2025-40147] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2025-40148] = "fixed-version: only affects 6.16 onwards"
CVE_STATUS[CVE-2025-40149] = "cpe-stable-backport: Backported in 6.12.66"
-# CVE-2025-40150 needs backporting (fixed from 6.18)
+CVE_STATUS[CVE-2025-40150] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2025-40151] = "fixed-version: only affects 6.17 onwards"
@@ -19682,7 +19678,7 @@ CVE_STATUS[CVE-2025-68237] = "cpe-stable-backport: Backported in 6.12.60"
CVE_STATUS[CVE-2025-68238] = "cpe-stable-backport: Backported in 6.12.60"
-# CVE-2025-68239 needs backporting (fixed from 6.18)
+CVE_STATUS[CVE-2025-68239] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2025-68240] = "cpe-stable-backport: Backported in 6.12.59"
@@ -19844,7 +19840,7 @@ CVE_STATUS[CVE-2025-68332] = "cpe-stable-backport: Backported in 6.12.62"
CVE_STATUS[CVE-2025-68333] = "cpe-stable-backport: Backported in 6.12.68"
-# CVE-2025-68334 needs backporting (fixed from 6.18)
+CVE_STATUS[CVE-2025-68334] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2025-68335] = "cpe-stable-backport: Backported in 6.12.62"
@@ -20312,7 +20308,7 @@ CVE_STATUS[CVE-2025-71150] = "cpe-stable-backport: Backported in 6.12.64"
CVE_STATUS[CVE-2025-71151] = "cpe-stable-backport: Backported in 6.12.64"
-# CVE-2025-71152 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2025-71152] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2025-71153] = "cpe-stable-backport: Backported in 6.12.64"
@@ -20330,7 +20326,7 @@ CVE_STATUS[CVE-2025-71159] = "fixed-version: only affects 6.18 onwards"
CVE_STATUS[CVE-2025-71160] = "cpe-stable-backport: Backported in 6.12.66"
-# CVE-2025-71161 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2025-71161] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2025-71162] = "cpe-stable-backport: Backported in 6.12.67"
@@ -20388,7 +20384,7 @@ CVE_STATUS[CVE-2025-71204] = "cpe-stable-backport: Backported in 6.12.70"
CVE_STATUS[CVE-2025-71220] = "cpe-stable-backport: Backported in 6.12.70"
-# CVE-2025-71221 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2025-71221] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2025-71222] = "cpe-stable-backport: Backported in 6.12.70"
@@ -20422,6 +20418,18 @@ CVE_STATUS[CVE-2025-71238] = "cpe-stable-backport: Backported in 6.12.74"
CVE_STATUS[CVE-2025-71239] = "cpe-stable-backport: Backported in 6.12.75"
+CVE_STATUS[CVE-2025-71265] = "cpe-stable-backport: Backported in 6.12.75"
+
+CVE_STATUS[CVE-2025-71266] = "cpe-stable-backport: Backported in 6.12.75"
+
+CVE_STATUS[CVE-2025-71267] = "cpe-stable-backport: Backported in 6.12.75"
+
+CVE_STATUS[CVE-2025-71268] = "cpe-stable-backport: Backported in 6.12.70"
+
+# CVE-2025-71269 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-71270] = "cpe-stable-backport: Backported in 6.12.70"
+
CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66"
CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66"
@@ -20478,7 +20486,7 @@ CVE_STATUS[CVE-2026-23002] = "cpe-stable-backport: Backported in 6.12.67"
CVE_STATUS[CVE-2026-23003] = "cpe-stable-backport: Backported in 6.12.67"
-# CVE-2026-23004 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2026-23004] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23005] = "cpe-stable-backport: Backported in 6.12.67"
@@ -20602,7 +20610,7 @@ CVE_STATUS[CVE-2026-23064] = "cpe-stable-backport: Backported in 6.12.68"
CVE_STATUS[CVE-2026-23065] = "cpe-stable-backport: Backported in 6.12.68"
-# CVE-2026-23066 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2026-23066] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23067] = "fixed-version: only affects 6.16 onwards"
@@ -20610,7 +20618,7 @@ CVE_STATUS[CVE-2026-23068] = "cpe-stable-backport: Backported in 6.12.68"
CVE_STATUS[CVE-2026-23069] = "cpe-stable-backport: Backported in 6.12.68"
-# CVE-2026-23070 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2026-23070] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23071] = "cpe-stable-backport: Backported in 6.12.68"
@@ -20678,7 +20686,7 @@ CVE_STATUS[CVE-2026-23101] = "cpe-stable-backport: Backported in 6.12.68"
CVE_STATUS[CVE-2026-23103] = "cpe-stable-backport: Backported in 6.12.68"
-# CVE-2026-23104 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2026-23104] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23105] = "cpe-stable-backport: Backported in 6.12.68"
@@ -20746,7 +20754,7 @@ CVE_STATUS[CVE-2026-23136] = "cpe-stable-backport: Backported in 6.12.66"
# CVE-2026-23137 needs backporting (fixed from 6.19)
-# CVE-2026-23138 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2026-23138] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23139] = "cpe-stable-backport: Backported in 6.12.66"
@@ -20784,7 +20792,7 @@ CVE_STATUS[CVE-2026-23155] = "cpe-stable-backport: Backported in 6.12.69"
CVE_STATUS[CVE-2026-23156] = "cpe-stable-backport: Backported in 6.12.69"
-# CVE-2026-23157 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2026-23157] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23158] = "cpe-stable-backport: Backported in 6.12.69"
@@ -20952,5 +20960,321 @@ CVE_STATUS[CVE-2026-23239] = "cpe-stable-backport: Backported in 6.12.75"
CVE_STATUS[CVE-2026-23240] = "cpe-stable-backport: Backported in 6.12.75"
-CVE_STATUS[CVE-2026-23241] = "cpe-stable-backport: Backported in 6.12.75"
+CVE_STATUS[CVE-2026-23241] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23242] = "cpe-stable-backport: Backported in 6.12.75"
+
+CVE_STATUS[CVE-2026-23243] = "cpe-stable-backport: Backported in 6.12.75"
+
+CVE_STATUS[CVE-2026-23244] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23245] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23246] = "cpe-stable-backport: Backported in 6.12.77"
+
+# CVE-2026-23247 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23248] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23249] = "cpe-stable-backport: Backported in 6.12.75"
+
+CVE_STATUS[CVE-2026-23250] = "cpe-stable-backport: Backported in 6.12.75"
+
+CVE_STATUS[CVE-2026-23251] = "cpe-stable-backport: Backported in 6.12.75"
+
+CVE_STATUS[CVE-2026-23252] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23253] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23254] = "cpe-stable-backport: Backported in 6.12.70"
+
+# CVE-2026-23255 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-23256] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23257] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23258] = "cpe-stable-backport: Backported in 6.12.70"
+
+# CVE-2026-23259 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-23260] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23261] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23262] = "cpe-stable-backport: Backported in 6.12.70"
+
+CVE_STATUS[CVE-2026-23263] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23264] = "cpe-stable-backport: Backported in 6.12.70"
+
+# CVE-2026-23265 needs backporting (fixed from 7.0rc1)
+
+CVE_STATUS[CVE-2026-23266] = "cpe-stable-backport: Backported in 6.12.74"
+
+CVE_STATUS[CVE-2026-23267] = "cpe-stable-backport: Backported in 6.12.74"
+
+CVE_STATUS[CVE-2026-23268] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23269] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23270] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23271] = "cpe-stable-backport: Backported in 6.12.77"
+
+# CVE-2026-23272 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23273] = "cpe-stable-backport: Backported in 6.12.75"
+
+CVE_STATUS[CVE-2026-23274] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23275] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23276] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23277] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23278] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23279] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23280] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23281] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23282] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23283] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23284] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23285] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23286] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23287] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23288] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23289] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23290] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23291] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23292] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23293] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23294] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23295] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23296] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23297] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23298] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23299] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-23300] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23301] = "fixed-version: only affects 6.19 onwards"
+
+# CVE-2026-23302 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23303] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23304] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23305] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23306] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23307] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23308] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23309] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23310] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23311] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-23312] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23313] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23314] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23315] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23316] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23317] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23318] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23319] = "cpe-stable-backport: Backported in 6.12.77"
+
+# CVE-2026-23320 needs backporting (fixed from 7.0rc1)
+
+CVE_STATUS[CVE-2026-23321] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23322] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23323] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23324] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23325] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23326] = "fixed-version: only affects 6.13 onwards"
+
+# CVE-2026-23327 needs backporting (fixed from 7.0rc2)
+
+CVE_STATUS[CVE-2026-23328] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23329] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2026-23330 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23332] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2026-23333 has no known resolution
+
+CVE_STATUS[CVE-2026-23334] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23335] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23336] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23337] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23338] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23339] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23340] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23341] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23342] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23343] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23344] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23345] = "fixed-version: only affects 6.13 onwards"
+
+# CVE-2026-23346 needs backporting (fixed from 7.0rc2)
+
+CVE_STATUS[CVE-2026-23347] = "cpe-stable-backport: Backported in 6.12.77"
+
+# CVE-2026-23348 needs backporting (fixed from 7.0rc2)
+
+CVE_STATUS[CVE-2026-23349] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23350] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23351] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23352] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23353] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23354] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23355] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23356] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23357] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23358] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23359] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23360] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23361] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23362] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23363] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23364] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23365] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23366] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23367] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23368] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23369] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23370] = "cpe-stable-backport: Backported in 6.12.77"
+
+# CVE-2026-23371 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23372] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23373] = "cpe-stable-backport: Backported in 6.12.77"
+
+# CVE-2026-23374 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23375] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23376] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2026-23377 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23378] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23379] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23380] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23381] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23382] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23383] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23384] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2026-23385 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23386] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23387] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23388] = "cpe-stable-backport: Backported in 6.12.77"
+
+# CVE-2026-23389 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23390] = "cpe-stable-backport: Backported in 6.12.74"
+
+CVE_STATUS[CVE-2026-23391] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23392] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23393] = "cpe-stable-backport: Backported in 6.12.78"
+
+# CVE-2026-23394 needs backporting (fixed from 7.0rc5)
+
+CVE_STATUS[CVE-2026-23395] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23396] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23397] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23398] = "cpe-stable-backport: Backported in 6.12.78"
+
+# CVE-2026-31788 has no known resolution
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 13/18] linux-yocto/6.12: update to v6.12.80
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (11 preceding siblings ...)
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 12/18] linux-yocto/6.12: update CVE exclusions (6.12.79) bruce.ashfield
@ 2026-04-23 15:45 ` bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 14/18] linux-yocto/6.12: update CVE exclusions (6.12.80) bruce.ashfield
` (5 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/6.12 to the latest korg -stable release that comprises
the following commits:
00d7934ffcc35 Linux 6.12.80
7b8410e13e7d2 idpf: nullify pointers after they are freed
acf942d0dccd8 net: bcmasp: Fix network filter wake for asp-3.0
1c0a49ce24c43 net: bcmasp: Restore programming of TX map vector register
d94f9b0ba28a2 dmaengine: idxd: Fix leaking event log memory
027145ace09fa futex: Require sys_futex_requeue() to have identical flags
33dce5758914b xen/privcmd: unregister xenstore notifier on module exit
d25552196dec0 btrfs: fix lost error when running device stats on multiple devices fs
1737ddeafbb13 btrfs: fix leak of kobject name for sub-group space_info
77a119d54c5d6 btrfs: fix super block offset in error message in btrfs_validate_super()
ea56f1a604941 dmaengine: xilinx_dma: Fix reset related timeout with two-channel AXIDMA
ba972cf9fe492 dmaengine: xilinx: xilinx_dma: Fix unmasked residue subtraction
dc2c68f3aa13c dmaengine: xilinx: xilinx_dma: Fix residue calculation for cyclic DMA
7317ae215d3f1 dmaengine: xilinx: xilinx_dma: Fix dma_device directions
e21da2ad88445 dmaengine: idxd: fix possible wrong descriptor completion in llist_abort_desc()
18c2e20b42dd2 netfs: Fix kernel BUG in netfs_limit_iter() for ITER_KVEC iterators
9787b3d9b9087 dmaengine: xilinx: xdma: Fix regmap init error handling
97e777f94f9ea dmaengine: dw-edma: Fix multiple times setting of the CYCLE_STATE and CYCLE_BIT bits for HDMA.
78727334d9c11 phy: ti: j721e-wiz: Fix device node reference leak in wiz_get_lane_phy_types()
379361cba6e5a dmaengine: idxd: Fix freeing the allocated ida too late
39c1504e0e76b dmaengine: idxd: Fix memory leak when a wq is reset
d02c24af126de dmaengine: idxd: Fix not releasing workqueue on .release()
46dd1b07dcec4 ASoC: ak4458: Convert to RUNTIME_PM_OPS() & co
a09380354d2f1 idpf: Fix RSS LUT NULL ptr issue after soft reset
df2790b5228fb idpf: Fix RSS LUT NULL pointer crash on early ethtool operations
9ad3d0836d8bc idpf: detach and close netdevs while handling a reset
1ca996324eaca idpf: check error for register_netdev() on init
ba0c7fff66160 ice: Fix PTP NULL pointer dereference during VSI rebuild
363377af2c9e8 ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw()
426d5b681b2f3 landlock: Fix handling of disconnected directories
17e8b80f199e2 landlock: Optimize file path walks and prepare for audit support
dcefd3f0b9ed8 net: add proper RCU protection to /proc/net/ptype
a079a62883e33 virt: tdx-guest: Fix handling of host controlled 'quote' buffer length
c4d603e8e58a3 xfs: avoid dereferencing log items after push callbacks
6c0cfbe020c0f ovl: make fsync after metadata copy-up opt-in mount option
67f35bd8653cc ovl: Use str_on_off() helper in ovl_show_options()
4fcfeecef69b2 rust: pin-init: internal: init: document load-bearing fact of field accessors
acc105db08267 rust: pin-init: add references to previously initialized fields
1e8da79267248 mm/damon/sysfs: check contexts->nr before accessing contexts_arr[0]
a2008925ed736 media: nxp: imx8-isi: Fix streaming cleanup on release
84e926c1c272a spi: tegra210-quad: Protect curr_xfer check in IRQ handler
de4c7c5c131c8 LoongArch: vDSO: Emit GNU_EH_FRAME correctly
ccd41f110c608 drm/xe: always keep track of remap prev/next
03474a01c199d tracing: Fix potential deadlock in cpu hotplug with osnoise
43e5f6deb8bf7 tracing: Switch trace_osnoise.c code over to use guard() and __free()
7de55bba69cbf ksmbd: fix use-after-free and NULL deref in smb_grant_oplock()
ff255e69911fe powerpc64/bpf: do not increment tailcall count when prog is NULL
95a16dcb49227 arm64: dts: imx8mn-tqma8mqnl: fix LDO5 power off
9b4d9dda6a71a ext4: always drain queued discard work in ext4_mb_release()
19782b4c793b4 ext4: fix iloc.bh leak in ext4_fc_replay_inode() error paths
4bec4a498ce86 ext4: handle wraparound when searching for blocks for indirect mapped blocks
de009e11f31a8 ext4: fix the might_sleep() warnings in kvfree()
034053378dd81 ext4: fix use-after-free in update_super_work when racing with umount
d787d3ae96648 ext4: reject mount if bigalloc with s_first_data_block != 0
9370207b36d26 ext4: avoid allocate block from corrupted group in ext4_mb_find_by_goal()
3a7667595bcad ext4: avoid infinite loops caused by residual data
407c944f217c1 ext4: validate p_idx bounds in ext4_ext_correct_indexes
d4b3f370c3d8f ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio
30c6e26562ec9 ext4: make recently_deleted() properly work with lazy itable initialization
f8f7f9ed88462 ext4: fix fsync(2) for nojournal mode
a29ceb262e957 ext4: fix stale xarray tags after writeback
7920dcc571cef ext4: convert inline data to extents when truncate exceeds inline size
ff01e2f410f18 ext4: fix journal credit check when setting fscrypt context
d5c3ed01f297b xfs: remove file_path tracepoint data
b5c5a50c2f513 xfs: don't irele after failing to iget in xfs_attri_recover_work
23e45598f1a83 xfs: fix ri_total validation in xlog_recover_attri_commit_pass2
e822f535273af xfs: scrub: unlock dquot before early return in quota scrub
d8fc60bbaf5ae xfs: save ailp before dropping the AIL lock in push callbacks
a89434a6188d8 xfs: stop reclaim before pushing AIL during unmount
596c3f8069c47 LoongArch: KVM: Make kvm_get_vcpu_by_cpuid() more robust
151ba1721ac50 LoongArch: Workaround LS2K/LS7A GPU DMA hang bug
5e7fde2c551f8 LoongArch: Fix missing NULL checks for kstrdup()
9a6cbb4a5c168 drm/i915/dp_tunnel: Fix error handling when clearing stream BW in atomic state
c0b3882836de8 drm/amdgpu: prevent immediate PASID reuse case
22d997add640f dmaengine: sh: rz-dmac: Move CHCTRL updates under spinlock
d91c84906e4c1 dmaengine: sh: rz-dmac: Protect the driver specific lists
abc1f0dabe505 dmaengine: fsl-edma: fix channel parameter config for fixed channel requests
7475dfad10a05 futex: Clear stale exiting pointer in futex_lock_pi() retry path
7b61e89c43cc5 irqchip/qcom-mpm: Add missing mailbox TX done acknowledgment
be9237be3f120 jbd2: gracefully abort on checkpointing state corruptions
459158151a158 KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE
984350b37372f net: macb: Use dev_consume_skb_any() to free TX SKBs
ff10e3682da0d net: macb: Protect access to net_device::ip_ptr with RCU lock
17970e0f6b62a net: macb: Move devm_{free,request}_irq() out of spin lock area
c52df6a33345e scsi: ses: Handle positive SCSI error from ses_recv_diag()
d1466bf991b23 scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done()
3699caf7d6601 ovl: fix wrong detection of 32bit inode numbers
a9f911b6607b1 phy: qcom: qmp-ufs: Fix SM8650 PCS table for Gear 4
d7853d9fe94ab x86/cpu: Remove X86_CR4_FRED from the CR4 pinned bits mask
756e19fe86542 x86/cpu: Enable FSGSBASE early in cpu_init_exception_handling()
6d37ec779d563 alarmtimer: Fix argument order in alarm_timer_forward()
378949f46e897 erofs: add GFP_NOIO in the bio completion if needed
f04733c4dc40c virtio_net: Fix UAF on dst_ops when IFF_XMIT_DST_RELEASE is cleared and napi_tx is false
d8549a453d5bd media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex
922a500e94767 hwmon: (peci/cputemp) Fix off-by-one in cputemp_is_visible()
8149678ff2684 hwmon: (peci/cputemp) Fix crit_hyst returning delta instead of absolute temperature
3510b90b7dcd3 hwmon: (pmbus/isl68137) Add mutex protection for AVS enable sysfs attributes
68e5da7c5326b KVM: arm64: Discard PC update state on vcpu reset
9808571b27969 platform/x86: ISST: Correct locked bit width
72d35b92d329a cpufreq: conservative: Reset requested_freq on limits change
9649d051e5441 can: isotp: fix tx.buf use-after-free in isotp_sendmsg()
c4e8eaa75fa0b can: gw: fix OOB heap access in cgw_csum_crc8_rel()
d131feed8d3ce ASoC: SOF: ipc4-topology: Allow bytes controls without initial payload
8771d7152f8d3 ALSA: firewire-lib: fix uninitialized local variable
1d1888b4a7aec ksmbd: do not expire session on binding failure
91aeaa7256006 ksmbd: fix memory leaks and NULL deref in smb2_lock()
7aec5a769d235 ksmbd: fix potencial OOB in get_file_all_info() for compound requests
6aef1765d6807 ksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len()
95c899cd79180 s390/entry: Scrub r12 register on kernel entry
54571224d8988 s390/barrier: Make array_index_mask_nospec() __always_inline
f8c444b918d63 s390/syscalls: Add spectre boundary for syscall dispatch table
d5d01f24bc6fb spi: spi-fsl-lpspi: fix teardown order issue (UAF)
432fa716e96ef ASoC: adau1372: Fix clock leak on PLL lock failure
2c678860898a2 ASoC: adau1372: Fix unchecked clk_prepare_enable() return value
82f8dc236dc55 sysctl: fix uninitialized variable in proc_do_large_bitmap
129d89223c43b hwmon: (pmbus) Introduce the concept of "write-only" attributes
9f7304720fb87 hwmon: (pmbus) Mark lowest/average/highest/rated attributes as read-only
881b8d5bbc12d hwmon: (pmbus/core) Fix various coding style issues
60a1b27313cee hwmon: (adm1177) fix sysfs ABI violation and current unit conversion
138e42be35ff2 drm/amdgpu: Fix fence put before wait in amdgpu_amdkfd_submit_ib
808c0f156f48d ACPI: EC: clean up handlers on probe failure in acpi_ec_setup()
eedf220442d13 spi: use generic driver_override infrastructure
5cd46bebc4e0c spi: Group CS related fields in struct spi_device
10862e344b4d6 drm/amd/display: Do not skip unrelated mode changes in DSC validation
40ad0334c17b2 spi: meson-spicc: Fix double-put in remove path
8367b909e015a ASoC: Intel: catpt: Fix the device initialization
6eba074a8a05f spi: sn-f-ospi: Fix resource leak in f_ospi_probe()
f14c9acb1a773 PM: hibernate: Drain trailing zero pages on userspace restore
6453341a0c734 drm/i915/gmbus: fix spurious timeout on 512-byte burst reads
a246bcb5f7ca1 x86/efi: efi_unmap_boot_services: fix calculation of ranges_to_free size
a5162ebfe0458 scsi: scsi_transport_sas: Fix the maximum channel scanning issue
6b4d3a91259a1 RDMA/irdma: Return EINVAL for invalid arp index error
a8a1c7621127a RDMA/irdma: Fix deadlock during netdev reset with active connections
bb22bf9bf054f RDMA/irdma: Remove reset check from irdma_modify_qp_to_err()
bc20987765932 RDMA/irdma: Clean up unnecessary dereference of event->cm_node
0d845d7d834fa RDMA/irdma: Remove a NOP wait_event() in irdma_modify_qp_roce()
6d1a63d4f2f12 RDMA/irdma: Update ibqp state to error if QP is already in error state
cd1534c8f4984 RDMA/irdma: Initialize free_qp completion before using it
49bbcb76c4c8a RDMA/rw: Fall back to direct SGE on MR pool exhaustion
08cd190baec5a ALSA: hda/realtek: Sequence GPIO2 on Star Labs StarFighter
9fea479f155d6 regmap: Synchronize cache for the page selector
9d74d10e4e266 net: macb: use the current queue number for stats
675c913b94048 netfilter: ctnetlink: use netlink policy range checks
7edca70751b9b netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp
dcfcd95b3ae76 netfilter: nf_conntrack_expect: skip expectations in other netns via proc
ded71f5684df1 netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check()
a2f6ff3444b66 netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD
6dc11e0bd0a54 tls: Purge async_hold in tls_decrypt_async_wait()
834cf890d2c3d Bluetooth: btusb: clamp SCO altsetting table indices
9a21a631ee034 Bluetooth: L2CAP: Fix ERTM re-init and zero pdu_len infinite loop
e10a4cb724686 Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock
d2d4f0f15d531 Bluetooth: L2CAP: Fix send LE flow credits in ACL link
b07431f47fe22 dma-mapping: add missing `inline` for `dma_free_attrs`
c0e696a74b19e net: lan743x: fix duplex configuration in mac_link_up
6d3161fa3eee6 team: fix header_ops type confusion with non-Ethernet ports
a0d9efb1e8f3f net: enetc: fix the output issue of 'ethtool --show-ring'
f1bed05a832ae udp: Fix wildcard bind conflict check when using hash2
afb7c7f20f2e0 tcp: optimize inet_use_bhash2_on_bind()
75fe6db23705a net: fix fanout UAF in packet_release() via NETDEV_UP race
c58c705939c75 ipv6: Don't remove permanent routes with exceptions from tb6_gc_hlist.
d9b859a7bf1fe ipv6: Remove permanent routes from tb6_gc_hlist when all exceptions expire.
1f931dee5b726 iavf: fix out-of-bounds writes in iavf_get_ethtool_stats()
1beb6a1711502 ice: use ice_update_eth_stats() for representor stats
7829daee9ba5d ice: fix inverted ready check for VF representors
42830f80495bb platform/x86: intel-hid: disable wakeup_mode during hibernation
392b2369fb215 platform/olpc: olpc-xo175-ec: Fix overflow error message to print inlen
8244cc1ce64bc net: bcmasp: fix double disable of clk
db060603452b2 net: bcmasp: Add support for asp-v3.0
121a6ad9cd42b net: bcmasp: fix double free of WoL irq
6c0a48684e380 net: bcmasp: streamline early exit in probe
88fff072ba83f net: bcmasp: Remove support for asp-v2.0
2463b69ccb617 net: bcm: asp2: convert to phylib managed EEE
5b9555915ab80 net: bcm: asp2: remove tx_lpi_enabled
ef6469df19f49 net: bcm: asp2: fix LPI timer handling
bd2e6b6367a29 rtnetlink: count IFLA_INFO_SLAVE_KIND in if_nlmsg_size
7bcb974c771c8 net/smc: fix double-free of smc_spd_priv when tee() duplicates splice pipe buffer
98de18d327ef8 openvswitch: validate MPLS set/set_masked payload length
bbe7bd722bfae openvswitch: defer tunnel netdev_put to RCU release
43579baa17270 net: openvswitch: Avoid releasing netdev before teardown completes
1edc12d2bbcb7 nfc: nci: fix circular locking dependency in nci_close_device
e324506b98bf6 ionic: fix persistent MAC address override on PF
3334494e69f39 pinctrl: mediatek: common: Fix probe failure for devices without EINT
0780f93338529 Bluetooth: L2CAP: Fix null-ptr-deref on l2cap_sock_ready_cb
5213ef54528dd Bluetooth: hci_ll: Fix firmware leak on error path
340666172cf74 Bluetooth: MGMT: Fix dangling pointer on mgmt_add_adv_patterns_monitor_complete
108b81514d8f2 Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold
40c7f7eea2f4d Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv()
c8e1a27edb8b4 Bluetooth: L2CAP: Fix stack-out-of-bounds read in l2cap_ecred_conn_req
76d115b228e4d can: statistics: add missing atomic access in hot path
d1ba7d6b3cd17 erofs: set fileio bio failed in short read case
1cf9fc3b190b3 dma: swiotlb: add KMSAN annotations to swiotlb_bounce()
7b18692c59afb af_key: validate families in pfkey_send_migrate()
56ea2257b83ee xfrm: prevent policy_hthresh.work from racing with netns teardown
32d0f44c2f14d xfrm: Fix work re-schedule after cancel in xfrm_nat_keepalive_net_fini()
df6f995358dc1 esp: fix skb leak with espintcp and async crypto
ddd2d7f20ab1c xfrm: Fix the usage of skb->sk
4092242a7347d xfrm: call xdo_dev_state_delete during state update
02c30fb68bed9 xfrm: fix the condition on x->pcpu_num in xfrm_sa_len
934e87be76f3b xfrm: add missing extack for XFRMA_SA_PCPU in add_acquire and allocspi
bd635bcd0a517 i3c: master: dw-i3c: Fix missing of_node for virtual I2C adapter
63a5bca438cfb ALSA: hda/realtek: add quirk for ASUS UM6702RC
3a800ad9382ad spi: intel-pci: Add support for Nova Lake mobile SPI flash
601e6ff6e5133 usb: core: new quirk to handle devices with zero configurations
7a27049b5bc27 drm/amdgpu: fix gpu idle power consumption issue for gfx v12
49c7c50ee6325 nvmet: move async event work off nvmet-wq
fee55fffbfcd9 objtool: Handle Clang RSP musical chairs
437b469c801b4 ALSA: hda/realtek: Add headset jack quirk for Thinkpad X390
b685eba97a5ae ALSA: hda/realtek: add HP Laptop 14s-dr5xxx mute LED quirk
a41a9b8d19a98 btrfs: set BTRFS_ROOT_ORPHAN_CLEANUP during subvol create
d81d519f1236d sched_ext: Use WRITE_ONCE() for the write side of dsq->seq update
31860c3f7ac66 HID: apple: avoid memory leak in apple_report_fixup()
9535c3eda0949 drm/ttm/tests: Fix build failure on PREEMPT_RT
c8324d387c794 ALSA: hda/senary: Ensure EAPD is enabled during init
5858510917896 dma-buf: Include ioctl.h in UAPI header
c4a5601fe0866 ASoC: fsl_easrc: Fix event generation in fsl_easrc_iec958_put_bits()
6a029865ef062 scsi: devinfo: Add BLIST_SKIP_IO_HINTS for Iomega ZIP
1d90b17aea622 scsi: mpi3mr: Clear reset history on ready and recheck state after timeout
fddbd2fe91cd7 ASoC: fsl_easrc: Fix event generation in fsl_easrc_iec958_set_reg()
ec2b22a58073f module: Fix kernel panic when a symbol st_shndx is out of bounds
4abc2186ed5b6 HID: asus: add xg mobile 2023 external hardware support
6bafb2e9b5b4e HID: mcp2221: cancel last I2C command on read error
da89e7137b9db kbuild: install-extmod-build: Package resolve_btfids if necessary
efe3f0d9bc252 net: usb: r8152: add TRENDnet TUC-ET2G
34221ae510833 HID: apple: Add EPOMAKER TH87 to the non-apple keyboards list
79e5dcc95d9ab HID: magicmouse: avoid memory leak in magicmouse_report_fixup()
1ba445e496b5f HID: magicmouse: fix battery reporting for Apple Magic Trackpad 2
acbc72dd1a09d nvme-pci: ensure we're polling a polled queue
e3baa5a402237 platform/x86: touchscreen_dmi: Add quirk for y-inverted Goodix touchscreen on SUPI S10
e34c5f314fa60 platform/x86: intel-hid: Enable 5-button array on ThinkPad X1 Fold 16 Gen 1
c5a280ff4f745 nvme-fabrics: use kfree_sensitive() for DHCHAP secrets
242934c6ddfb4 nvme-pci: cap queue creation to used queues
5e9788df789ce platform/x86: intel-hid: Add Dell 14 Plus 2-in-1 to dmi_vgbs_allow_list
7a6d6e4d8af04 HID: asus: avoid memory leak in asus_report_fixup()
342aa1ee995ef bpf: Fix unsound scalar forking in maybe_fork_scalars() for BPF_OR
9ab1227765c44 bpf: Fix undefined behavior in interpreter sdiv/smod for INT_MIN
b1f3c2ba6512e bpf: Release module BTF IDR before module unload
9a6086d2a828d driver core: platform: use generic driver_override infrastructure
78aba57ca3de5 driver core: generalize driver_override in struct device
8e655e0effd71 sh: platform_early: remove pdev->driver_override check
0064ad7695412 hwmon: axi-fan: don't use driver_override as IRQ name
92c47342c66d4 cxl/hdm: Avoid incorrect DVSEC fallback when HDM decoders are enabled
3a696e84a8b1f perf: Make sure to use pmu_ctx->pmu for groups
56af722756ed8 bpf: Fix constant blinding for PROBE_MEM32 stores
d216a4bd138eb cxl/port: Fix use after free of parent_port in cxl_detach_ep()
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/linux-yocto-rt_6.12.bb | 6 ++--
.../linux/linux-yocto-tiny_6.12.bb | 6 ++--
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++----------
3 files changed, 20 insertions(+), 20 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
index 609f2eaefb..4c754bcd21 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
@@ -15,13 +15,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "7e842d87b9b4b32c87ffa1eff0923050b2fb4579"
-SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479"
+SRCREV_machine ?= "682f6c2088ea37c1dcc324905956034eda630d52"
+SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
-LINUX_VERSION ?= "6.12.79"
+LINUX_VERSION ?= "6.12.80"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
index 2cd5b510d9..d760030c21 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
@@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc
include recipes-kernel/linux/cve-exclusion.inc
include recipes-kernel/linux/cve-exclusion_6.12.inc
-LINUX_VERSION ?= "6.12.79"
+LINUX_VERSION ?= "6.12.80"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
-SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479"
+SRCREV_machine ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
+SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7"
PV = "${LINUX_VERSION}+git"
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
index 7b34f33272..c50dc6dfac 100644
--- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
@@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base"
KBRANCH:qemuloongarch64 ?= "v6.12/standard/base"
KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "bdecc68b604a59ee8f0bde1b96240d48938009c2"
-SRCREV_machine:qemuarm64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
-SRCREV_machine:qemuloongarch64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
-SRCREV_machine:qemumips ?= "0f5e1025c5fe2f07e5e64dca977e10f4d42389db"
-SRCREV_machine:qemuppc ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
-SRCREV_machine:qemuriscv64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
-SRCREV_machine:qemuriscv32 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
-SRCREV_machine:qemux86 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
-SRCREV_machine:qemux86-64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
-SRCREV_machine:qemumips64 ?= "b1f97d0b31600bbbf29d4b9e519bca2a7104a2b4"
-SRCREV_machine ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a"
-SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479"
+SRCREV_machine:qemuarm ?= "dd1da548895086a19df2c3fc9586999789081636"
+SRCREV_machine:qemuarm64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
+SRCREV_machine:qemuloongarch64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
+SRCREV_machine:qemumips ?= "14123935e5dd112c3a4daa4c5a756b82298ecf4d"
+SRCREV_machine:qemuppc ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
+SRCREV_machine:qemuriscv64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
+SRCREV_machine:qemuriscv32 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
+SRCREV_machine:qemux86 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
+SRCREV_machine:qemux86-64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
+SRCREV_machine:qemumips64 ?= "d6af6b480ab453a08f04ce80ab25a131f54f8e34"
+SRCREV_machine ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
+SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "c2d104a355013a14bcd73e31fb2c4bc21922115a"
+SRCREV_machine:class-devupstream ?= "00d7934ffcc35e65b113ba4991c8a3338bd85fc1"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v6.12/base"
@@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "6.12.79"
+LINUX_VERSION ?= "6.12.80"
PV = "${LINUX_VERSION}+git"
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 14/18] linux-yocto/6.12: update CVE exclusions (6.12.80)
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (12 preceding siblings ...)
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 13/18] linux-yocto/6.12: update to v6.12.80 bruce.ashfield
@ 2026-04-23 15:45 ` bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 15/18] linux-yocto/6.12: update to v6.12.81 bruce.ashfield
` (4 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 49 changes (12 new | 37 updated): - 12 new CVEs: CVE-2026-39389, CVE-2026-39390, CVE-2026-39391, CVE-2026-39392, CVE-2026-39393, CVE-2026-39394, CVE-2026-39406, CVE-2026-39407, CVE-2026-39408, CVE-2026-39409, CVE-2026-39410, CVE-2026-39865 - 37 updated CVEs: CVE-2021-4473, CVE-2025-57854, CVE-2025-58713, CVE-2026-1342, CVE-2026-28264, CVE-2026-31790, CVE-2026-32712, CVE-2026-34765, CVE-2026-35023, CVE-2026-35035, CVE-2026-35463, CVE-2026-35484, CVE-2026-35488, CVE-2026-35533, CVE-2026-39319, CVE-2026-39332, CVE-2026-39356, CVE-2026-39369, CVE-2026-39374, CVE-2026-39688, CVE-2026-39690, CVE-2026-39692, CVE-2026-39694, CVE-2026-39696, CVE-2026-3243, CVE-2026-3296, CVE-2026-3480, CVE-2026-3600, CVE-2026-4065, CVE-2026-4111, CVE-2026-4300, CVE-2026-4330, CVE-2026-4785, CVE-2026-4788, CVE-2026-4808, CVE-2026-4931, CVE-2026-5300
Date: Wed, 8 Apr 2026 14:50:02 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/cve-exclusion_6.12.inc | 236 ++++++++++++++++--
1 file changed, 216 insertions(+), 20 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index bba789c9e5..e4e81ee492 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2026-03-27 19:55:47.691205+00:00 for kernel version 6.12.79
-# From linux_kernel_cves cve_2026-03-27_1900Z-2-gb6d5823e23a
+# Generated at 2026-04-08 14:59:27.074934+00:00 for kernel version 6.12.80
+# From linux_kernel_cves cve_2026-04-08_1400Z
python check_kernel_cve_status_version() {
- this_version = "6.12.79"
+ this_version = "6.12.80"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -16110,9 +16110,9 @@ CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards"
CVE_STATUS[CVE-2025-22115] = "cpe-stable-backport: Backported in 6.12.40"
-# CVE-2025-22116 needs backporting (fixed from 6.15)
+CVE_STATUS[CVE-2025-22116] = "cpe-stable-backport: Backported in 6.12.80"
-# CVE-2025-22117 needs backporting (fixed from 6.15)
+CVE_STATUS[CVE-2025-22117] = "cpe-stable-backport: Backported in 6.12.80"
CVE_STATUS[CVE-2025-22118] = "fixed-version: only affects 6.13 onwards"
@@ -19248,7 +19248,7 @@ CVE_STATUS[CVE-2025-40216] = "cpe-stable-backport: Backported in 6.12.36"
CVE_STATUS[CVE-2025-40218] = "cpe-stable-backport: Backported in 6.12.54"
-CVE_STATUS[CVE-2025-40219] = "cpe-stable-backport: Backported in 6.12.54"
+CVE_STATUS[CVE-2025-40219] = "cpe-stable-backport: Backported in 6.12.75"
CVE_STATUS[CVE-2025-40220] = "cpe-stable-backport: Backported in 6.12.54"
@@ -19554,7 +19554,7 @@ CVE_STATUS[CVE-2025-68173] = "cpe-stable-backport: Backported in 6.12.58"
# CVE-2025-68174 needs backporting (fixed from 6.18)
-# CVE-2025-68175 needs backporting (fixed from 6.18)
+CVE_STATUS[CVE-2025-68175] = "cpe-stable-backport: Backported in 6.12.80"
CVE_STATUS[CVE-2025-68176] = "cpe-stable-backport: Backported in 6.12.58"
@@ -19958,7 +19958,7 @@ CVE_STATUS[CVE-2025-68734] = "cpe-stable-backport: Backported in 6.12.59"
# CVE-2025-68735 needs backporting (fixed from 6.19)
-# CVE-2025-68736 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2025-68736] = "cpe-stable-backport: Backported in 6.12.80"
CVE_STATUS[CVE-2025-68737] = "fixed-version: only affects 6.18 onwards"
@@ -20108,8 +20108,6 @@ CVE_STATUS[CVE-2025-68810] = "cpe-stable-backport: Backported in 6.12.64"
CVE_STATUS[CVE-2025-68811] = "cpe-stable-backport: Backported in 6.12.64"
-CVE_STATUS[CVE-2025-68812] = "fixed-version: only affects 6.15 onwards"
-
CVE_STATUS[CVE-2025-68813] = "cpe-stable-backport: Backported in 6.12.64"
CVE_STATUS[CVE-2025-68814] = "cpe-stable-backport: Backported in 6.12.64"
@@ -20440,7 +20438,7 @@ CVE_STATUS[CVE-2026-22979] = "cpe-stable-backport: Backported in 6.12.66"
CVE_STATUS[CVE-2026-22980] = "cpe-stable-backport: Backported in 6.12.66"
-# CVE-2026-22981 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2026-22981] = "cpe-stable-backport: Backported in 6.12.80"
CVE_STATUS[CVE-2026-22982] = "cpe-stable-backport: Backported in 6.12.66"
@@ -20448,7 +20446,7 @@ CVE_STATUS[CVE-2026-22983] = "fixed-version: only affects 6.18.4 onwards"
CVE_STATUS[CVE-2026-22984] = "cpe-stable-backport: Backported in 6.12.66"
-# CVE-2026-22985 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2026-22985] = "cpe-stable-backport: Backported in 6.12.80"
# CVE-2026-22986 needs backporting (fixed from 6.19)
@@ -20464,7 +20462,7 @@ CVE_STATUS[CVE-2026-22991] = "cpe-stable-backport: Backported in 6.12.66"
CVE_STATUS[CVE-2026-22992] = "cpe-stable-backport: Backported in 6.12.66"
-# CVE-2026-22993 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2026-22993] = "cpe-stable-backport: Backported in 6.12.80"
CVE_STATUS[CVE-2026-22994] = "cpe-stable-backport: Backported in 6.12.66"
@@ -20892,13 +20890,13 @@ CVE_STATUS[CVE-2026-23205] = "cpe-stable-backport: Backported in 6.12.70"
CVE_STATUS[CVE-2026-23206] = "cpe-stable-backport: Backported in 6.12.70"
-CVE_STATUS[CVE-2026-23207] = "fixed-version: only affects 6.18.2 onwards"
+CVE_STATUS[CVE-2026-23207] = "cpe-stable-backport: Backported in 6.12.80"
# CVE-2026-23208 needs backporting (fixed from 6.19)
CVE_STATUS[CVE-2026-23209] = "cpe-stable-backport: Backported in 6.12.70"
-# CVE-2026-23210 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2026-23210] = "cpe-stable-backport: Backported in 6.12.80"
CVE_STATUS[CVE-2026-23211] = "fixed-version: only affects 6.18 onwards"
@@ -20988,7 +20986,7 @@ CVE_STATUS[CVE-2026-23253] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23254] = "cpe-stable-backport: Backported in 6.12.70"
-# CVE-2026-23255 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2026-23255] = "cpe-stable-backport: Backported in 6.12.80"
CVE_STATUS[CVE-2026-23256] = "cpe-stable-backport: Backported in 6.12.70"
@@ -21118,8 +21116,6 @@ CVE_STATUS[CVE-2026-23318] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23319] = "cpe-stable-backport: Backported in 6.12.77"
-# CVE-2026-23320 needs backporting (fixed from 7.0rc1)
-
CVE_STATUS[CVE-2026-23321] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23322] = "fixed-version: only affects 6.18 onwards"
@@ -21144,7 +21140,7 @@ CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards"
CVE_STATUS[CVE-2026-23332] = "fixed-version: only affects 6.16 onwards"
-# CVE-2026-23333 has no known resolution
+# CVE-2026-23333 needs backporting (fixed from 7.0rc1)
CVE_STATUS[CVE-2026-23334] = "cpe-stable-backport: Backported in 6.12.77"
@@ -21276,5 +21272,205 @@ CVE_STATUS[CVE-2026-23397] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23398] = "cpe-stable-backport: Backported in 6.12.78"
-# CVE-2026-31788 has no known resolution
+CVE_STATUS[CVE-2026-23399] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23400] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23401] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-23402] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23403] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23404] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23405] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23406] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23407] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23408] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23409] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23410] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23411] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23412] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23413] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23414] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-23415] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23416] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23417] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-23418] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23419] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23420] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23421] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23422] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23423] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23424] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23425] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23426] = "cpe-stable-backport: Backported in 6.12.77"
+
+CVE_STATUS[CVE-2026-23427] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23428] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23429] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23430] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23431] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23432] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23433] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23434] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23435] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23436] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23437] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23438] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23439] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23440] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23441] = "cpe-stable-backport: Backported in 6.12.78"
+
+# CVE-2026-23442 needs backporting (fixed from 7.0rc5)
+
+CVE_STATUS[CVE-2026-23443] = "cpe-stable-backport: Backported in 6.12.78"
+
+# CVE-2026-23444 needs backporting (fixed from 7.0rc5)
+
+CVE_STATUS[CVE-2026-23445] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23446] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23447] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23448] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23449] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23450] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23451] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23452] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23453] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23454] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23455] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23456] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23457] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23458] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23459] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23460] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23461] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23462] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23463] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23464] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23465] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23466] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23467] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2026-23468 needs backporting (fixed from 7.0rc5)
+
+# CVE-2026-23469 needs backporting (fixed from 7.0rc5)
+
+CVE_STATUS[CVE-2026-23470] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23471] = "cpe-stable-backport: Backported in 6.12.78"
+
+# CVE-2026-23472 needs backporting (fixed from 7.0rc5)
+
+# CVE-2026-23473 needs backporting (fixed from 7.0rc5)
+
+CVE_STATUS[CVE-2026-23474] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-23475] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31389] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31390] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-31391] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31392] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31393] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31394] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31395] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-31396] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31397] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-31398] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-31399] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31400] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31401] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31402] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31403] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31404] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-31405] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31406] = "cpe-stable-backport: Backported in 6.12.80"
+
+# CVE-2026-31407 needs backporting (fixed from 7.0rc5)
+
+CVE_STATUS[CVE-2026-31408] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31409] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31410] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31411] = "cpe-stable-backport: Backported in 6.12.75"
+
+CVE_STATUS[CVE-2026-31788] = "cpe-stable-backport: Backported in 6.12.78"
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 15/18] linux-yocto/6.12: update to v6.12.81
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (13 preceding siblings ...)
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 14/18] linux-yocto/6.12: update CVE exclusions (6.12.80) bruce.ashfield
@ 2026-04-23 15:45 ` bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 16/18] linux-yocto/6.12: update CVE exclusions (6.12.81) bruce.ashfield
` (3 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/6.12 to the latest korg -stable release that comprises
the following commits:
e7a3953084a70 Linux 6.12.81
787781697f216 selftests/bpf: test refining u32/s32 bounds when ranges cross min/max boundary
ded1ea20d0b77 bpf: Fix u32/s32 bounds when ranges cross min/max boundary
58d4c4a257ad4 bpf: Add third round of bounds deduction
d7a73ec8015bc selftests/bpf: Test invariants on JSLT crossing sign
269d80981a5c7 selftests/bpf: Test cross-sign 64bits range refinement
d7d7b4879d994 bpf: Improve bounds when s64 crosses sign boundary
3708bea44e732 drm/amd/display: Correct logic check error for fastboot
4ab0ca29df9af drm/amd: Disable ASPM on SI
2b5a2083c9eb7 drm/amd/display: Disable scaling on DCE6 for now
3ab5be94925f4 drm/amd/display: Adjust DCE 8-10 clock, don't overclock by 15%
85229e17e8d7e drm/amd/display: Fix DCE 6.0 and 6.4 PLL programming.
fd1b69d047a4a drm/amd/display: Keep PLL0 running on DCE 6.0 and 6.4
207b18daaae25 drm/amd/display: Disable fastboot on DCE 6 too
1f9b3e72fd7da drm/amd/amdgpu: disable ASPM in some situations
8f187036a3e65 drm/amd/amdgpu: decouple ASPM with pcie dpm
2145a80f47cd5 x86/CPU/AMD: Add additional fixed RDSEED microcode revisions
f496eee88c605 MPTCP: fix lock class name family in pm_nl_create_listen_socket
ac69fbda177f3 s390/cpum_sf: Cap sampling rate to prevent lsctl exception
a1d24d8e59c8d s390/perf_cpum_sf: Convert to use try_cmpxchg128()
e76bcb727e487 ext4: publish jinode after initialization
38bac39274a3a drm/amd/pm: disable OD_FAN_CURVE if temp or pwm range invalid for smu v13
2b307be747cf7 mm/memory: fix PMD/PUD checks in follow_pfnmap_start()
9bcbf9ae7db8b mm: replace READ_ONCE() with standard page table accessors
b8c49ad888892 mm/huge_memory: fix folio isn't locked in softleaf_to_folio()
70cad63b3bc63 x86/fred: Fix early boot failures on SEV-ES/SNP guests
7cbd69aaa507b scsi: target: tcm_loop: Drain commands in target_reset handler
43f5b19fd190f net: mana: fix use-after-free in add_adev() error path
33670f780e012 net: correctly handle tunneled traffic on IPV6_CSUM GSO fallback
022e3d4112afa spi: cadence-qspi: Fix exec_mem_op error handling
c5fa98842783e wifi: virt_wifi: remove SET_NETDEV_DEV to avoid use-after-free
be2d32f0c3fe3 usb: gadget: f_uac1_legacy: validate control request size
f7d00ee1c8082 usb: gadget: f_hid: move list and spinlock inits from bind to alloc
1ef251aa63972 usb: gadget: f_rndis: Fix net_device lifecycle with device_move
70707ce668494 usb: gadget: f_subset: Fix net_device lifecycle with device_move
a6b8bce01a30a usb: gadget: f_eem: Fix net_device lifecycle with device_move
5eaeac22240d9 usb: gadget: f_ecm: Fix net_device lifecycle with device_move
7d8fa3b8783ab usb: gadget: f_rndis: Protect RNDIS options with mutex
cc8ec610cd14c usb: gadget: f_subset: Fix unbalanced refcnt in geth_free
8a1128d604c36 usb: gadget: uvc: fix NULL pointer dereference during unbind race
0326429e8ba99 usb: gadget: u_ether: Fix NULL pointer deref in eth_get_drvinfo
bbb09bb89ffa5 usb: gadget: u_ether: Fix race between gether_disconnect and eth_stop
0a1fbbd780f04 btrfs: do not free data reservation in fallback from inline due to -ENOSPC
b6310d040d715 btrfs: fix the qgroup data free range for inline data extents
b23282218eca2 ice: Fix memory leak in ice_set_ringparam()
f6dcbf2b024d5 usb: typec: ucsi: validate connector number in ucsi_notify_common()
bc9e80feec629 usb: gadget: dummy_hcd: fix premature URB completion when ZLP follows partial transfer
94d4fab1dd9e6 USB: dummy-hcd: Fix interrupt synchronization error
805b1833d6ed6 USB: dummy-hcd: Fix locking/synchronization error
d35df146eff91 thunderbolt: Fix property read in nhi_wake_supported()
0bdee4118340c misc: fastrpc: possible double-free of cctx->remote_heap
604da9c04c218 thermal: core: Fix thermal zone device registration error path
bc49d5a3c049a gpio: mxc: map Both Edge pad wakeup to Rising Edge
427d048e4f6ac cpufreq: governor: fix double free in cpufreq_dbs_governor_init() error path
0b832aad33e6f net: ethernet: mtk_ppe: avoid NULL deref when gmac0 is disabled
d45230081f19c net: ftgmac100: fix ring allocation unwind on open failure
de20d2e3b9179 vxlan: validate ND option lengths in vxlan_na_create
bdbf027a4504b crypto: tegra - Add missing CRYPTO_ALG_ASYNC
633dfbf0eb276 counter: rz-mtu3-cnt: do not use struct rz_mtu3_channel's dev member
ced8b48420edd counter: rz-mtu3-cnt: prevent counter from being toggled multiple times
b7eef00f08b92 netfilter: ipset: drop logically empty buckets in mtype_del
2f6e5b9964d0a nvmem: zynqmp_nvmem: Fix buffer size in DMA and memcpy
9c01cfe54a7d2 nvmem: imx: assign nvmem_cell_info::raw_len
5de15580ef147 dt-bindings: connector: add pd-disable dependency
cad3327ab50d9 firmware: microchip: fail auto-update probe if no flash found
99f31aa98ab6e comedi: me4000: Fix potential overrun of firmware buffer
1bf8761eb59e9 comedi: me_daq: Fix potential overrun of firmware buffer
3848ae00b1642 comedi: ni_atmio16d: Fix invalid clean-up after failed attach
430291d8f3884 comedi: Reinit dev->spinlock between attachments to low-level drivers
65c528fbeddd8 comedi: dt2815: add hardware detection to prevent crash
f0e520784d5ac cdc-acm: new quirk for EPSON HMD
c49b9256bbacb bridge: br_nd_send: validate ND option lengths
0b7f1d1352e46 Revert "LoongArch/orc: Use RCU in all users of __module_address()."
8eb219e34da19 Revert "LoongArch: Remove unnecessary checks for ORC unwinder"
c471e3ae674f5 Revert "LoongArch: Handle percpu handler address for ORC unwinder"
c7e475ae3a559 usb: cdns3: gadget: fix state inconsistency on gadget init failure
d61446dfc9d38 usb: cdns3: gadget: fix NULL pointer dereference in ep_queue
af0d688a8d55d usb: core: phy: avoid double use of 'usb3-phy'
4ed9d2dd9f298 usb: dwc2: gadget: Fix spin_lock/unlock mismatch in dwc2_hsotg_udc_stop()
874c95ebbe595 usb: ehci-brcm: fix sleep during atomic
d13318dec0c1e usb: usbtmc: Flush anchored URBs in usbtmc_release
8763f8317bb38 usb: ulpi: fix double free in ulpi_register_interface() error path
f8f45359f9682 usb: quirks: add DELAY_INIT quirk for another Silicon Motion flash drive
f5a6a5f412b3f iio: gyro: mpu3050: Fix out-of-sequence free_irq()
92f18aa86302f iio: gyro: mpu3050: Move iio_device_register() to correct location
b52fd1644ad2c iio: gyro: mpu3050: Fix irq resource leak
8631e755fc07b iio: gyro: mpu3050: Fix incorrect free_irq() variable
10ec3158d4719 iio: imu: st_lsm6dsx: Set FIFO ODR for accelerometer and gyroscope only
42d4e0d4f12cd iio: imu: bmi160: Remove potential undefined behavior in bmi160_config_pin()
b64050f926145 iio: light: vcnl4035: fix scan buffer on big-endian
87a2fb7162d3f iio: dac: ad5770r: fix error return in ad5770r_read_raw()
6c122c911e405 iio: accel: adxl380: fix FIFO watermark bit 8 always written as 0
4f420f4b46e7d iio: accel: fix ADXL355 temperature signature value
acdeaf1dea613 iio: adc: aspeed: clear reference voltage bits before configuring vref
f3f9c94e504fa Input: xpad - add support for Razer Wolverine V3 Pro
2348168b7d71d Input: xpad - add support for BETOP BTP-KP50B/C controller's wireless mode
ff809b77f4cfb Input: bcm5974 - recover from failed mode switch
c9e103994e33e Input: i8042 - add TUXEDO InfinityBook Max 16 Gen10 AMD to i8042 quirk table
86f10a395325b Input: synaptics-rmi4 - fix a locking bug in an error path
3ac9c06f80ada USB: core: add NO_LPM quirk for Razer Kiyo Pro webcam
5a19500e3461b USB: serial: option: add support for Rolling Wireless RW135R-GL
2a8f48cd3c6e2 USB: serial: io_edgeport: add support for Blackbox IC135A
79129c94aa8a0 drm/amdgpu/pm: drop SMU driver if version not matched messages
6b2614a0ff05a drm/amdgpu: Change AMDGPU_VA_RESERVED_TRAP_SIZE to 64KB
890ee92cc4fd9 drm/i915/dp: Use crtc_state->enhanced_framing properly on ivb/hsw CPU eDP
55efe8402f46a drm/i915/dsi: Don't do DSC horizontal timing adjustments in command mode
9c40e6294756a drm/ast: dp501: Fix initialization of SCU2C
7685e0e3e3448 iio: adc: ti-ads1119: Replace IRQF_ONESHOT with IRQF_NO_THREAD
054836eecc469 iio: adc: ti-ads1119: Reinit completion before wait_for_completion_timeout()
1da4cf3a06c37 iio: adc: ti-ads1119: Fix unbalanced pm reference count in ds1119_single_conversion()
67b3a91bdc482 iio: adc: ti-adc161s626: use DMA-safe memory for spi_read()
6165d8d71ce8a iio: adc: ti-adc161s626: fix buffer read on big-endian
93ca9febac89b drm/amdgpu: fix the idr allocation flags
6e965c91983a8 mips: mm: Allocate tlb_vpn array atomically
bbbefc48f6617 hwmon: (occ) Fix division by zero in occ_show_power_1()
a8d2212538051 MIPS: Fix the GCC version check for `__multi3' workaround
ab9a172ca0822 MIPS: SiByte: Bring back cache initialisation
d48c64fb80ad7 ksmbd: fix OOB write in QUERY_INFO for compound requests
f5d446624345d Bluetooth: hci_sync: fix stack buffer overflow in hci_le_big_create_sync
c8ff0ca650853 Bluetooth: SMP: force responder MITM requirements before building the pairing response
0afc846bd8007 Bluetooth: SMP: derive legacy responder STK authentication from MITM state
90ced24c500ad io_uring/net: fix slab-out-of-bounds read in io_bundle_nbufs()
a0b45bdfffce9 ALSA: ctxfi: Fix missing SPDIFI1 index handling
3178b62e2e31b ALSA: caiaq: fix stack out-of-bounds read in init_card
84f3fab430d85 USB: serial: option: add MeiG Smart SRM825WN
e67d8c626ace8 wifi: iwlwifi: mvm: fix potential out-of-bounds read in iwl_mvm_nd_match_info_handler()
c97b2a0005960 wifi: wilc1000: fix u8 overflow in SSID scan buffer size calculation
4a41c2b18fc05 drm/ioc32: stop speculation on the drm_compat_ioctl path
c289154aef97f riscv: kgdb: fix several debug register assignment bugs
c089147074ed9 sched/fair: Fix zero_vruntime tracking fix
6277998e3abce sched/fair: Use protect_slice() instead of direct comparison
e8fd60338545f mips: ralink: update CPU clock index
2c9b408807bc5 hwmon: (occ) Fix missing newline in occ_show_extended()
5fb6dd8beeefa hwmon: (tps53679) Fix device ID comparison and printing in tps53676_identify()
f286132539060 dt-bindings: gpio: fix microchip #interrupt-cells
7fd4a5682c788 hwmon: (ltc4286) Add missing MODULE_IMPORT_NS("PMBUS")
96878fbb37bfe hwmon: (pxe1610) Check return value of page-select write in probe
08021f2d4a557 accel/qaic: Handle DBC deactivation if the owner went away
931d71104fd71 iio: imu: bno055: fix BNO055_SCAN_CH_COUNT off by one
8624e819a2dcf Revert "drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug"
70abd9d118da2 bpf: reject direct access to nullable PTR_TO_BUF pointers
63fda74885555 ipv6: avoid overflows in ip6_datagram_send_ctl()
c1ed6d68fbe17 net: hsr: fix VLAN add unwind on slave errors
9bf5fc36a43f7 net/sched: cls_flow: fix NULL pointer dereference on shared blocks
5cf41031922c1 net/sched: cls_fw: fix NULL pointer dereference on shared blocks
4e2d1bcef78d2 net/x25: Fix overflow when accumulating packets
524371398d846 net/x25: Fix potential double free of skb
0856789f6064a bnxt_en: Restore default stat ctxs for ULP when resource is available
2ebb13f3e8be0 net/mlx5: Fix switchdev mode rollback in case of failure
d22c8bb054dc0 net/mlx5: Avoid "No data available" when FW version queries fail
cfa774e6c920c net/mlx5: lag: Check for LAG device before creating debugfs
e35dbfdb1b771 net: macb: properly unregister fixed rate clocks
f310a836da90d net: macb: fix clk handling on PCI glue driver removal
13a66ca1e235d net/sched: sch_netem: fix out-of-bounds access in packet corruption
68187f18a89be bpf: sockmap: Fix use-after-free of sk->sk_socket in sk_psock_verdict_data_ready().
a5bfd14c9a299 rds: ib: reject FRMR registration before IB connection is established
0b706fb2294af Bluetooth: MGMT: validate mesh send advertising payload length
7cadb03be37e7 Bluetooth: hci_event: fix potential UAF in hci_le_remote_conn_param_req_evt
66d432e9b45ba Bluetooth: hci_conn: fix potential UAF in set_cig_params_sync
82f342b3b006c Bluetooth: MGMT: validate LTK enc_size on load
7e296ffdab5bd Bluetooth: SCO: fix race conditions in sco_sock_connect()
94445b8517a0b Bluetooth: hci_sync: call destroy in hci_cmd_sync_run if immediate
f710691be163a netfilter: nf_tables: reject immediate NF_QUEUE verdict
e7e1b6bcb389c netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP
0f6c33697ccfa netfilter: ctnetlink: ignore explicit helper on new expectations
f8cebc41afd89 netfilter: nf_conntrack_expect: store netns and zone in expectation
4bd1b3d839172 netfilter: nf_conntrack_expect: use expect->helper
afd5afd32ba82 netfilter: nf_conntrack_expect: honor expectation helper field
fd002ff2ea030 netfilter: ctnetlink: zero expect NAT fields when CTA_EXPECT_NAT absent
2c16e4d64dd91 netfilter: nf_conntrack_helper: pass helper to expect cleanup
69acb09ef957c netfilter: ipset: use nla_strcmp for IPSET_ATTR_NAME attr
673bbd36cba21 netfilter: x_tables: ensure names are nul-terminated
6b419700e459f netfilter: nfnetlink_log: account for netlink header size
57c78bd2e2dd0 netfilter: flowtable: strictly check for maximum number of actions
8027964931785 net: ipv6: flowlabel: defer exclusive option free until RCU teardown
7241da033fdc5 bpf: Fix regsafe() for pointers to packet
8b079642413d6 ASoC: Intel: boards: fix unmet dependency on PINCTRL
6a2124da900a3 net: xilinx: axienet: Correct BD length masks to match AXIDMA IP spec
f48ab6ee654ec NFC: pn533: bound the UART receive buffer
d6db08484c6cb net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak
f7a6cd508e9e8 net: use skb_header_pointer() for TCPv4 GSO frag_off check
c3c09b7b771d4 net: introduce mangleid_features
cce5027f9dc3a net: airoha: Add missing cleanup bits in airoha_qdma_cleanup_rx_queue()
25357b670afb5 ipv6: prevent possible UaF in addrconf_permanent_addr()
4045b72a0853f ASoC: ep93xx: Fix unchecked clk_prepare_enable() and add rollback on failure
fdaa12c6682c0 net: enetc: check whether the RSS algorithm is Toeplitz
76dfdcef11199 net: sfp: Fix Ubiquiti U-Fiber Instant SFP module on mvneta
b9e6431cbea8b net/sched: sch_hfsc: fix divide-by-zero in rtsc_min()
2ba4caba423ed bridge: br_nd_send: linearize skb before parsing ND options
f513cdd55a480 eth: fbnic: Account for page fragments when updating BDQ tail
1063515ce15ff ip6_tunnel: clear skb2->cb[] in ip4ip6_err()
e41953e7d118e ipv6: icmp: clear skb2->cb[] in ip6_err_gen_icmpv6_unreach()
d8ce8e2dfd32c tg3: Fix race for querying speed/duplex
77695a69baca9 net/ipv6: ioam6: prevent schema length wraparound in trace fill
4f810c686fde5 net: ipv6: ndisc: fix ndisc_ra_useropt to initialize nduseropt_padX fields to zero to prevent an info-leak
69402908e277d net: qrtr: replace qrtr_tx_flow radix_tree with xarray to fix memory leak
5eb37a39ae80d net: fec: fix the PTP periodic output sysfs interface
44eafa39363e8 crypto: af-alg - fix NULL pointer dereference in scatterwalk
c2fb4984fe09f crypto: caam - fix overflow on long hmac keys
c0c133e0225d8 crypto: caam - fix DMA corruption on long hmac keys
08020567bf5fa wifi: ath11k: Pass the correct value of each TID during a stop AMPDU session
368bcaa8f3a03 dt-bindings: auxdisplay: ht16k33: Use unevaluatedProperties to fix common property warning
35783cb13a25e spi: geni-qcom: Check DMA interrupts early in ISR
53ceedd1eb628 btrfs: reject root items with drop_progress and zero drop_level
2b3cc69a318eb i2c: tegra: Don't mark devices with pins as IRQ safe
bb6eb33c908ed btrfs: reserve enough transaction items for qgroup ioctls
6a4acd3e86fe5 HID: multitouch: Check to ensure report responses match the request
772f99cc8d6e5 HID: logitech-hidpp: Prevent use-after-free on force feedback initialisation failure
e3da29787887c objtool: Fix Clang jump table detection
ab319b5a8bca4 tg3: replace placeholder MAC address with device property
7eb0da6455986 btrfs: don't take device_list_mutex when querying zone info
3989740fa4978 atm: lec: fix use-after-free in sock_def_readable()
41026bcc0fdf8 HID: wacom: fix out-of-bounds read in wacom_intuos_bt_irq
8148c2fda4ebb wifi: mac80211: check tdls flag in ieee80211_tdls_oper
194c2e93e5ae2 HID: logitech-hidpp: Enable MX Master 4 over bluetooth
c4bcd4a10edd3 arm64/scs: Fix handling of advance_loc4
fd65688547c99 io_uring/kbuf: propagate BUF_MORE through early buffer commit path
1593101304e64 io_uring/kbuf: fix missing BUF_MORE for incremental buffers at EOF
4399febfb1166 io_uring/kbuf: use WRITE_ONCE() for userspace-shared buffer ring fields
612c324f63965 io_uring/kbuf: use READ_ONCE() for userspace-mapped memory
91f262ea2a76a io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths
c4dbca5be33c6 io_uring/kbuf: enable bundles for incrementally consumed buffers
341d13c23f79f io_uring/rw: check for NULL io_br_sel when putting a buffer
c16afaebfdc65 io_uring/net: correct type for min_not_zero() cast
015f7e0507f40 io_uring: remove async/poll related provided buffer recycles
1249eae601f98 io_uring/kbuf: switch to storing struct io_buffer_list locally
7ba8b025035bb io_uring/net: use struct io_br_sel->val as the send finish value
72f60a59ef4ce io_uring/net: use struct io_br_sel->val as the recv finish value
0f045bf7287d3 io_uring/kbuf: use struct io_br_sel for multiple buffers picking
06877b3a72455 io_uring/kbuf: introduce struct io_br_sel
ac6c9a9e5082a io_uring/kbuf: pass in struct io_buffer_list to commit/recycle helpers
e6f280230e401 io_uring/net: clarify io_recv_buf_select() return value
f7a76e3adf03f io_uring/net: don't use io_net_kbuf_recyle() for non-provided cases
c0cdc6a0e9851 io_uring/kbuf: drop 'issue_flags' from io_put_kbuf(s)() arguments
c6d48713644bf io_uring/kbuf: uninline __io_put_kbufs
e802d79d11ce7 io_uring/kbuf: introduce io_kbuf_drop_legacy()
bfd4739463ec4 io_uring/kbuf: open code __io_put_kbuf()
55de36310adce io_uring/kbuf: remove legacy kbuf caching
3fb42ddddfb17 io_uring/kbuf: simplify __io_put_kbuf
badb3134c9113 io_uring/kbuf: remove legacy kbuf kmem cache
0e2e453f31359 io_uring/kbuf: remove legacy kbuf bulk allocation
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/linux-yocto-rt_6.12.bb | 6 ++--
.../linux/linux-yocto-tiny_6.12.bb | 6 ++--
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++----------
3 files changed, 20 insertions(+), 20 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
index 4c754bcd21..5a7d17c21e 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
@@ -15,13 +15,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "682f6c2088ea37c1dcc324905956034eda630d52"
-SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7"
+SRCREV_machine ?= "4277a7a5b623fcf652c3c73d77baa1fc15c1faf4"
+SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
-LINUX_VERSION ?= "6.12.80"
+LINUX_VERSION ?= "6.12.81"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
index d760030c21..533da7130b 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
@@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc
include recipes-kernel/linux/cve-exclusion.inc
include recipes-kernel/linux/cve-exclusion_6.12.inc
-LINUX_VERSION ?= "6.12.80"
+LINUX_VERSION ?= "6.12.81"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
-SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7"
+SRCREV_machine ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
+SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778"
PV = "${LINUX_VERSION}+git"
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
index c50dc6dfac..e48084fcd3 100644
--- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
@@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base"
KBRANCH:qemuloongarch64 ?= "v6.12/standard/base"
KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "dd1da548895086a19df2c3fc9586999789081636"
-SRCREV_machine:qemuarm64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
-SRCREV_machine:qemuloongarch64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
-SRCREV_machine:qemumips ?= "14123935e5dd112c3a4daa4c5a756b82298ecf4d"
-SRCREV_machine:qemuppc ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
-SRCREV_machine:qemuriscv64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
-SRCREV_machine:qemuriscv32 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
-SRCREV_machine:qemux86 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
-SRCREV_machine:qemux86-64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
-SRCREV_machine:qemumips64 ?= "d6af6b480ab453a08f04ce80ab25a131f54f8e34"
-SRCREV_machine ?= "18e0f76d6fff9522f4df78a484d68e814999b29a"
-SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7"
+SRCREV_machine:qemuarm ?= "54a370021957bfa24b4580a75518248174890205"
+SRCREV_machine:qemuarm64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
+SRCREV_machine:qemuloongarch64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
+SRCREV_machine:qemumips ?= "0b864eeca749237236d8ec10e7ed373958f497c4"
+SRCREV_machine:qemuppc ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
+SRCREV_machine:qemuriscv64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
+SRCREV_machine:qemuriscv32 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
+SRCREV_machine:qemux86 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
+SRCREV_machine:qemux86-64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
+SRCREV_machine:qemumips64 ?= "20f68d6b803a62b9bd958a453a669cd9ac75d22a"
+SRCREV_machine ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
+SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "00d7934ffcc35e65b113ba4991c8a3338bd85fc1"
+SRCREV_machine:class-devupstream ?= "e7a3953084a7050ca349010deb22546834c2e196"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v6.12/base"
@@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "6.12.80"
+LINUX_VERSION ?= "6.12.81"
PV = "${LINUX_VERSION}+git"
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 16/18] linux-yocto/6.12: update CVE exclusions (6.12.81)
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (14 preceding siblings ...)
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 15/18] linux-yocto/6.12: update to v6.12.81 bruce.ashfield
@ 2026-04-23 15:45 ` bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 17/18] linux-yocto/6.12: update to v6.12.83 bruce.ashfield
` (2 subsequent siblings)
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 4 changes (4 new | 0 updated): - 4 new CVEs: CVE-2026-24893, CVE-2026-25125, CVE-2026-25133, CVE-2026-27287 - 0 updated CVEs:
Date: Tue, 14 Apr 2026 20:56:01 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/cve-exclusion_6.12.inc | 98 ++++++++++++-------
1 file changed, 64 insertions(+), 34 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index e4e81ee492..2ae4f461e5 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2026-04-08 14:59:27.074934+00:00 for kernel version 6.12.80
-# From linux_kernel_cves cve_2026-04-08_1400Z
+# Generated at 2026-04-14 21:08:51.681656+00:00 for kernel version 6.12.81
+# From linux_kernel_cves cve_2026-04-14_2000Z-1-g4a280a922d3
python check_kernel_cve_status_version() {
- this_version = "6.12.80"
+ this_version = "6.12.81"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -18450,7 +18450,7 @@ CVE_STATUS[CVE-2025-39814] = "fixed-version: only affects 6.16 onwards"
CVE_STATUS[CVE-2025-39815] = "cpe-stable-backport: Backported in 6.12.45"
-CVE_STATUS[CVE-2025-39816] = "cpe-stable-backport: Backported in 6.12.49"
+CVE_STATUS[CVE-2025-39816] = "cpe-stable-backport: Backported in 6.12.81"
CVE_STATUS[CVE-2025-39817] = "cpe-stable-backport: Backported in 6.12.45"
@@ -20424,7 +20424,7 @@ CVE_STATUS[CVE-2025-71267] = "cpe-stable-backport: Backported in 6.12.75"
CVE_STATUS[CVE-2025-71268] = "cpe-stable-backport: Backported in 6.12.70"
-# CVE-2025-71269 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2025-71269] = "cpe-stable-backport: Backported in 6.12.81"
CVE_STATUS[CVE-2025-71270] = "cpe-stable-backport: Backported in 6.12.70"
@@ -20970,7 +20970,7 @@ CVE_STATUS[CVE-2026-23245] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23246] = "cpe-stable-backport: Backported in 6.12.77"
-# CVE-2026-23247 needs backporting (fixed from 7.0rc3)
+# CVE-2026-23247 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23248] = "fixed-version: only affects 6.14 onwards"
@@ -21006,7 +21006,7 @@ CVE_STATUS[CVE-2026-23263] = "fixed-version: only affects 6.17 onwards"
CVE_STATUS[CVE-2026-23264] = "cpe-stable-backport: Backported in 6.12.70"
-# CVE-2026-23265 needs backporting (fixed from 7.0rc1)
+# CVE-2026-23265 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23266] = "cpe-stable-backport: Backported in 6.12.74"
@@ -21020,7 +21020,7 @@ CVE_STATUS[CVE-2026-23270] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23271] = "cpe-stable-backport: Backported in 6.12.77"
-# CVE-2026-23272 needs backporting (fixed from 7.0rc3)
+# CVE-2026-23272 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23273] = "cpe-stable-backport: Backported in 6.12.75"
@@ -21052,7 +21052,7 @@ CVE_STATUS[CVE-2026-23286] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23287] = "cpe-stable-backport: Backported in 6.12.77"
-CVE_STATUS[CVE-2026-23288] = "fixed-version: only affects 6.19 onwards"
+CVE_STATUS[CVE-2026-23288] = "fixed-version: only affects 6.19.4 onwards"
CVE_STATUS[CVE-2026-23289] = "cpe-stable-backport: Backported in 6.12.77"
@@ -21080,7 +21080,7 @@ CVE_STATUS[CVE-2026-23300] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23301] = "fixed-version: only affects 6.19 onwards"
-# CVE-2026-23302 needs backporting (fixed from 7.0rc3)
+# CVE-2026-23302 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23303] = "cpe-stable-backport: Backported in 6.12.77"
@@ -21128,20 +21128,18 @@ CVE_STATUS[CVE-2026-23325] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23326] = "fixed-version: only affects 6.13 onwards"
-# CVE-2026-23327 needs backporting (fixed from 7.0rc2)
+# CVE-2026-23327 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23328] = "fixed-version: only affects 6.14 onwards"
CVE_STATUS[CVE-2026-23329] = "fixed-version: only affects 6.18 onwards"
-# CVE-2026-23330 needs backporting (fixed from 7.0rc3)
+# CVE-2026-23330 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards"
CVE_STATUS[CVE-2026-23332] = "fixed-version: only affects 6.16 onwards"
-# CVE-2026-23333 needs backporting (fixed from 7.0rc1)
-
CVE_STATUS[CVE-2026-23334] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23335] = "cpe-stable-backport: Backported in 6.12.77"
@@ -21156,7 +21154,7 @@ CVE_STATUS[CVE-2026-23339] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23340] = "cpe-stable-backport: Backported in 6.12.77"
-CVE_STATUS[CVE-2026-23341] = "fixed-version: only affects 6.19 onwards"
+CVE_STATUS[CVE-2026-23341] = "fixed-version: only affects 6.19.4 onwards"
CVE_STATUS[CVE-2026-23342] = "fixed-version: only affects 6.18 onwards"
@@ -21166,11 +21164,11 @@ CVE_STATUS[CVE-2026-23344] = "fixed-version: only affects 6.19 onwards"
CVE_STATUS[CVE-2026-23345] = "fixed-version: only affects 6.13 onwards"
-# CVE-2026-23346 needs backporting (fixed from 7.0rc2)
+# CVE-2026-23346 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23347] = "cpe-stable-backport: Backported in 6.12.77"
-# CVE-2026-23348 needs backporting (fixed from 7.0rc2)
+# CVE-2026-23348 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23349] = "fixed-version: only affects 6.18 onwards"
@@ -21184,7 +21182,7 @@ CVE_STATUS[CVE-2026-23353] = "fixed-version: only affects 6.19 onwards"
CVE_STATUS[CVE-2026-23354] = "cpe-stable-backport: Backported in 6.12.77"
-CVE_STATUS[CVE-2026-23355] = "fixed-version: only affects 6.18 onwards"
+CVE_STATUS[CVE-2026-23355] = "fixed-version: only affects 6.18.14 onwards"
CVE_STATUS[CVE-2026-23356] = "cpe-stable-backport: Backported in 6.12.77"
@@ -21216,19 +21214,19 @@ CVE_STATUS[CVE-2026-23369] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23370] = "cpe-stable-backport: Backported in 6.12.77"
-# CVE-2026-23371 needs backporting (fixed from 7.0rc3)
+# CVE-2026-23371 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23372] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23373] = "cpe-stable-backport: Backported in 6.12.77"
-# CVE-2026-23374 needs backporting (fixed from 7.0rc3)
+# CVE-2026-23374 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23375] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23376] = "fixed-version: only affects 6.18 onwards"
-# CVE-2026-23377 needs backporting (fixed from 7.0rc3)
+# CVE-2026-23377 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23378] = "cpe-stable-backport: Backported in 6.12.77"
@@ -21244,7 +21242,7 @@ CVE_STATUS[CVE-2026-23383] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23384] = "fixed-version: only affects 6.18 onwards"
-# CVE-2026-23385 needs backporting (fixed from 7.0rc3)
+# CVE-2026-23385 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23386] = "cpe-stable-backport: Backported in 6.12.78"
@@ -21252,7 +21250,7 @@ CVE_STATUS[CVE-2026-23387] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23388] = "cpe-stable-backport: Backported in 6.12.77"
-# CVE-2026-23389 needs backporting (fixed from 7.0rc3)
+CVE_STATUS[CVE-2026-23389] = "cpe-stable-backport: Backported in 6.12.81"
CVE_STATUS[CVE-2026-23390] = "cpe-stable-backport: Backported in 6.12.74"
@@ -21262,7 +21260,7 @@ CVE_STATUS[CVE-2026-23392] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23393] = "cpe-stable-backport: Backported in 6.12.78"
-# CVE-2026-23394 needs backporting (fixed from 7.0rc5)
+# CVE-2026-23394 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23395] = "cpe-stable-backport: Backported in 6.12.78"
@@ -21358,11 +21356,11 @@ CVE_STATUS[CVE-2026-23440] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23441] = "cpe-stable-backport: Backported in 6.12.78"
-# CVE-2026-23442 needs backporting (fixed from 7.0rc5)
+# CVE-2026-23442 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23443] = "cpe-stable-backport: Backported in 6.12.78"
-# CVE-2026-23444 needs backporting (fixed from 7.0rc5)
+# CVE-2026-23444 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23445] = "cpe-stable-backport: Backported in 6.12.78"
@@ -21376,7 +21374,7 @@ CVE_STATUS[CVE-2026-23449] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23450] = "cpe-stable-backport: Backported in 6.12.78"
-CVE_STATUS[CVE-2026-23451] = "fixed-version: only affects 6.18 onwards"
+CVE_STATUS[CVE-2026-23451] = "fixed-version: only affects 6.18.19 onwards"
CVE_STATUS[CVE-2026-23452] = "cpe-stable-backport: Backported in 6.12.78"
@@ -21410,17 +21408,15 @@ CVE_STATUS[CVE-2026-23466] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23467] = "fixed-version: only affects 6.16 onwards"
-# CVE-2026-23468 needs backporting (fixed from 7.0rc5)
+# CVE-2026-23468 needs backporting (fixed from 7.0)
-# CVE-2026-23469 needs backporting (fixed from 7.0rc5)
+# CVE-2026-23469 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23470] = "cpe-stable-backport: Backported in 6.12.78"
-CVE_STATUS[CVE-2026-23471] = "cpe-stable-backport: Backported in 6.12.78"
-
-# CVE-2026-23472 needs backporting (fixed from 7.0rc5)
+# CVE-2026-23472 needs backporting (fixed from 7.0)
-# CVE-2026-23473 needs backporting (fixed from 7.0rc5)
+# CVE-2026-23473 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-23474] = "cpe-stable-backport: Backported in 6.12.78"
@@ -21462,7 +21458,7 @@ CVE_STATUS[CVE-2026-31405] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-31406] = "cpe-stable-backport: Backported in 6.12.80"
-# CVE-2026-31407 needs backporting (fixed from 7.0rc5)
+# CVE-2026-31407 needs backporting (fixed from 7.0)
CVE_STATUS[CVE-2026-31408] = "cpe-stable-backport: Backported in 6.12.80"
@@ -21472,5 +21468,39 @@ CVE_STATUS[CVE-2026-31410] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-31411] = "cpe-stable-backport: Backported in 6.12.75"
+CVE_STATUS[CVE-2026-31412] = "cpe-stable-backport: Backported in 6.12.78"
+
+CVE_STATUS[CVE-2026-31413] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31414] = "cpe-stable-backport: Backported in 6.12.81"
+
+CVE_STATUS[CVE-2026-31415] = "cpe-stable-backport: Backported in 6.12.81"
+
+CVE_STATUS[CVE-2026-31416] = "cpe-stable-backport: Backported in 6.12.81"
+
+CVE_STATUS[CVE-2026-31417] = "cpe-stable-backport: Backported in 6.12.81"
+
+CVE_STATUS[CVE-2026-31418] = "cpe-stable-backport: Backported in 6.12.81"
+
+# CVE-2026-31419 needs backporting (fixed from 7.0)
+
+# CVE-2026-31420 needs backporting (fixed from 7.0)
+
+CVE_STATUS[CVE-2026-31421] = "cpe-stable-backport: Backported in 6.12.81"
+
+CVE_STATUS[CVE-2026-31422] = "cpe-stable-backport: Backported in 6.12.81"
+
+CVE_STATUS[CVE-2026-31423] = "cpe-stable-backport: Backported in 6.12.81"
+
+CVE_STATUS[CVE-2026-31424] = "cpe-stable-backport: Backported in 6.12.81"
+
+CVE_STATUS[CVE-2026-31425] = "cpe-stable-backport: Backported in 6.12.81"
+
+CVE_STATUS[CVE-2026-31426] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31427] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31428] = "cpe-stable-backport: Backported in 6.12.80"
+
CVE_STATUS[CVE-2026-31788] = "cpe-stable-backport: Backported in 6.12.78"
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 17/18] linux-yocto/6.12: update to v6.12.83
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (15 preceding siblings ...)
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 16/18] linux-yocto/6.12: update CVE exclusions (6.12.81) bruce.ashfield
@ 2026-04-23 15:45 ` bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 18/18] linux-yocto/6.12: update CVE exclusions (6.12.83) bruce.ashfield
2026-04-24 15:00 ` [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 Yoann Congal
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Updating linux-yocto/6.12 to the latest korg -stable release that comprises
the following commits:
eefc95626b5c Linux 6.12.83
817daf163312 PCI: Revert "Enable ACS after configuring IOMMU for OF platforms"
bc9843c39f99 ipv6: add NULL checks for idev in SRv6 paths
f8f55a226aab PCI: Fix placement of pci_save_state() in pci_bus_add_device()
29f05b91d8da rxrpc: Fix key quota calculation for multitoken keys
947f953978b0 ocfs2: fix out-of-bounds write in ocfs2_write_end_inline
c1de19e891be ocfs2: validate inline data i_size during inode read
fad0e70f4ace ocfs2: add inline inode consistency check to ocfs2_validate_inode_block()
98a0a81ce780 media: hackrf: fix to not free memory after the device is registered in hackrf_probe()
be57e52e27c7 media: vidtv: fix pass-by-value structs causing MSAN warnings
449ec5fc99f4 nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map
582fbecb3756 media: as102: fix to not free memory after the device is registered in as102_usb_probe()
add4982510f3 bcache: fix cached_dev.sb_bio use-after-free and crash
af75b486f7e8 ALSA: 6fire: fix use-after-free on disconnect
c78e1d4e48f2 hwmon: (powerz) Fix use-after-free on USB disconnect
5fb294032772 media: em28xx: fix use-after-free in em28xx_v4l2_open()
a8a55913552a media: mediatek: vcodec: fix use-after-free in encoder release path
98c22210aead media: vidtv: fix nfeeds state corruption on start_streaming failure
dfc8292a1d67 mm: blk-cgroup: fix use-after-free in cgwb_release_workfn()
a05f77cb227c mm/kasan: fix double free for kasan pXds
b7412ed789ff ASoC: qcom: q6apm: move component registration to unmanaged version
b5a02d37eb07 KVM: x86: Use scratch field in MMIO fragment to hold small write values
b1e13fdc27ca x86-64/arm64/powerpc: clean up and rename __copy_from_user_flushcache
f5945c8904e5 x86: rename and clean up __copy_from_user_inatomic_nocache()
14b9194db4a2 x86-64: rename misleadingly named '__copy_user_nocache()' function
e46a2cbd942c checkpatch: add support for Assisted-by tag
300fb45afa7c KVM: x86: Use __DECLARE_FLEX_ARRAY() for UAPI structures with VLAs
b46ef44fe927 KVM: Remove subtle "struct kvm_stats_desc" pseudo-overlay
74c2471eb891 kernel: be more careful about dup_mmap() failures and uprobe registering
af2648ee5847 net: sched: fix TCF_LAYER_TRANSPORT handling in tcf_get_base_ptr()
1ef731547dfd gpiolib: fix race condition for gdev->srcu
3dc1f48c42f2 gpiolib: unify two loops initializing GPIO descriptors
ab423e589282 KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION
d93f7c00d884 KVM: SEV: Disallow LAUNCH_FINISH if vCPUs are actively being created
c9609847ae65 KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPU
6773cc24c004 PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup
911b557dd781 ocfs2: handle invalid dinode in ocfs2_group_extend
4cf2768a0291 ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY
2b884d52273c ocfs2: fix possible deadlock between unlink and dio_end_io_write
e589de36da10 media: vidtv: fix NULL pointer dereference in vidtv_channel_pmt_match_sections
ddd57ebce245 dcache: Limit the minimal number of bucket to two
365c36e1a126 ALSA: ctxfi: Limit PTP to a single page
3be0d8895704 Docs/admin-guide/mm/damon/reclaim: warn commit_inputs vs param updates race
6e921c599161 USB: serial: option: add Telit Cinterion FN990A MBIM composition
2f640c6043ae staging: sm750fb: fix division by zero in ps_to_hz()
a4f4371d194d wifi: rtw88: fix device leak on probe failure
4b762046b1bd scripts: generate_rust_analyzer.py: avoid FD leak
03797cdee38e fbdev: udlfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO
ad279de5d6f1 usb: port: add delay after usb_hub_set_port_power()
c6c0d13db5d0 usb: gadget: f_hid: don't call cdev_init while cdev in use
603d5a711083 USB: cdc-acm: Add quirks for Yoga Book 9 14IAH10 INGENIC touchscreen
57662bd432f3 usb: storage: Expand range of matched versions for VL817 quirks entry
8d155e2d1c41 usbip: validate number_of_packets in usbip_pack_ret_submit()
dd577cb55588 ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc
08f9e6d899b5 ksmbd: require 3 sub-authorities before reading sub_auth[2]
551dfb15b182 ksmbd: validate EaNameLength in smb2_get_ea()
5cc0574c84aa smb: client: fix off-by-8 bounds check in check_wsl_eas()
adb8014599fd usb: gadget: renesas_usb3: validate endpoint index in standard request handlers
c9315ce9da36 usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete()
8757a2593631 usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb()
53cb4e79a071 fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO
e103f98f6615 ALSA: fireworks: bound device-supplied status before string array lookup
ef2ee9db13b6 drm/vc4: platform_get_irq_byname() returns an int
1bec5698b55a NFC: digital: Bounds check NFC-A cascade depth in SDD response handler
a23b1b1aaf41 net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete()
58386f00af71 HID: core: clamp report_size in s32ton() to avoid undefined shift
8eed7bce7a4c HID: alps: fix NULL pointer dereference in alps_raw_event()
d5b8f5f8d6fc staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify()
d87d5620125a i2c: s3c24xx: check the size of the SMBUS message before using it
572f0bf536eb can: raw: fix ro->uniq use-after-free in raw_rcv()
796e0cac0582 nfc: llcp: add missing return after LLCP_CLOSED checks
b448529f2f29 idpf: fix PREEMPT_RT raw/bh spinlock nesting for async VC handling
09e17780dc0c ALSA: usb-audio: Improve Focusrite sample rate filtering
1a6d2b001eb7 thermal: core: Address thermal zone removal races with resume
ac72b577dadb thermal: core: Mark thermal zones as exiting before unregistration
5d40cb3ba31b Revert "drm/xe: Switch MMIO interface to take xe_mmio instead of xe_gt"
94a14a68ad31 Revert "drm/xe/mmio: Avoid double-adjust in 64-bit reads"
9174d28f3f15 netfilter: conntrack: add missing netlink policy validations
af2fa2fbbced crypto: algif_aead - Fix minimum RX size check for decryption
d66792919d4f sched/deadline: Use revised wakeup rule for dl_server
6cfc187d85f1 perf/x86/intel/uncore: Skip discovery table for offline dies
9bf3e6ccfdcf crypto: af_alg - limit RX SG extraction by receive buffer budget
4ee7dcd76ce9 gpio: tegra: fix irq_release_resources calling enable instead of disable
77c1489398c8 l2tp: Drop large packets with UDP encap
2bf18b643c46 net: ipa: fix event ring index not programmed for IPA v5.0+
d1c66396796f net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+
0c739f3785f8 af_unix: read UNIX_DIAG_VFS data under unix_state_lock
16eb3c2f86de net: txgbe: leave space for null terminators on property_entry
22730cb96093 netfilter: nfnetlink_queue: make hash table per queue
7bc3f58c452f netfilter: nfnetlink_queue: nfqnl_instance GFP_ATOMIC -> GFP_KERNEL_ACCOUNT allocation
9eda5478746e netfilter: ip6t_eui64: reject invalid MAC header for all packets
aec14808271f netfilter: xt_multiport: validate range encoding in checkentry
d1399632ba25 netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG_DONE terminator
403995931500 ipvs: fix NULL deref in ip_vs_add_service error path
c2275ac1a9a3 selftests: net: bridge_vlan_mcast: wait for h1 before querier check
5a1a4b049ddd xfrm_user: fix info leak in build_mapping()
21e235a36cfb xfrm: fix refcount leak in xfrm_migrate_policy_find
438b1f668ad5 xfrm: Wait for RCU readers during policy netns exit
f669d60db11d xsk: validate MTU against usable frame size on bind
b412b5e33943 xsk: fix XDP_UMEM_SG_FLAG issues
a4ee85f55a2d xsk: respect tailroom for ZC setups
0ec4d3f6e693 xsk: tighten UMEM headroom validation to account for tailroom and min frame
dc230df28471 e1000: check return value of e1000_read_eeprom
2270ebab5312 ixgbevf: add missing negotiate_features op to Hyper-V ops table
83f2daf5297b tracing/probe: reject non-closed empty immediate strings
96f8efe50464 dt-bindings: net: Fix Tegra234 MGBE PTP clock
9a3351cf1b2c net: stmmac: Fix PTP ref clock for Tegra234
7c31f7a599cf nfc: s3fwrn5: allocate rx skb before consuming bytes
be638321b0da net: increase IP_TUNNEL_RECURSION_LIMIT to 5
6be325206850 ipv4: icmp: fix null-ptr-deref in icmp_build_probe()
615517f3f8d5 ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop()
e20b85bfbed8 ipv4: nexthop: avoid duplicate NHA_HW_STATS_ENABLE on nexthop group dump
328bb2cff5c2 net: lapbether: handle NETDEV_PRE_TYPE_CHANGE
a69738efea09 net: sched: act_csum: validate nested VLAN headers
5b1173b16542 eventpoll: defer struct eventpoll free to RCU grace period
0768598cf753 drm/vc4: Protect madv read in vc4_gem_object_mmap() with madv_lock
d8fdd6adc07b drm/vc4: Fix a memory leak in hang state error path
0d3c014a8439 drm/vc4: Fix memory leak of BO array in hang state
44361a76b151 drm/vc4: Release runtime PM reference after binding V3D
2c41283d94af xfrm: account XFRMA_IF_ID in aevent size calculation
c5c13f1a6dc4 HID: amd_sfh: don't log error when device discovery fails with -EOPNOTSUPP
5fde03df639d PCI: hv: Set default NUMA node to 0 for devices without affinity info
29af688c457a tools/power/turbostat: Fix microcode patch level output for AMD/Hygon
c93ca7c5a72e soc: qcom: pd-mapper: Fix element length in servreg_loc_pfr_req_ei
2d3248fe5663 arm64: dts: imx93-tqma9352: improve eMMC pad configuration
7a5082db69e6 arm64: dts: imx93-9x9-qsb: change usdhc tuning step for eMMC and SD
42e3ff61bbd6 arm64: dts: imx8mq: Set the correct gpu_ahb clock frequency
35550eb71aaf arm64: dts: qcom: hamoa/x1: fix idle exit latency
cd4aab4d7b61 soc: aspeed: socinfo: Mask table entries for accurate SoC ID matching
4ec47edcf3cd ASoC: stm32_sai: fix incorrect BCLK polarity for DSP_A/B, LEFT_J
9224ba3215a9 net: sfp: add quirks for Hisense and HSGQ GPON ONT SFP modules
9fca68c2512a wifi: brcmfmac: validate bsscfg indices in IF events
ee95f3c56a0d ata: ahci: force 32-bit DMA for JMicron JMB582/JMB585
e16a6d11bd77 HID: roccat: fix use-after-free in roccat_report_event
609057040da9 ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14IAH10
1753b0c6fd53 HID: quirks: add HID_QUIRK_ALWAYS_POLL for 8BitDo Pro 3
a712242521be platform/x86/amd: pmc: Add Thinkpad L14 Gen3 to quirk_s2idle_bug
66dd07f0b93c pinctrl: intel: Fix the revision for new features (1kOhm PD, HW debouncer)
361b9cddf20b ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14IMH9
f9ac49dda21e ASoC: amd: yc: Add DMI entry for HP Laptop 15-fc0xxx
2d29214448ec fs/smb/client: fix out-of-bounds read in cifs_sanitize_prepath
8db2ca260d56 ALSA: usb-audio: Fix quirk flags for NeuralDSP Quad Cortex
50eed7986f23 ALSA: hda/realtek: Add quirk for Samsung Book2 Pro 360 (NP950QED)
ade07920ca2c ASoC: soc-core: call missing INIT_LIST_HEAD() for card_aux_list
df15adc692a8 wifi: wl1251: validate packet IDs before indexing tx_frames
0843006565bd ALSA: hda/realtek: add quirk for Framework F111:000F
3d53f9aafd46 netfilter: nft_set_pipapo_avx2: don't return non-matching entry on expiry
48a21d309343 drm/amdgpu: Handle GPU page faults correctly on non-4K page systems
b46e7a31e5d2 ALSA: hda/realtek: Add mute LED quirk for HP Pavilion 15-eg0xxx
32372781d664 btrfs: tracepoints: get correct superblock from dentry in event btrfs_sync_file()
7a8886444cc6 platform/x86: asus-nb-wmi: add DMI quirk for ASUS ROG Flow Z13-KJP GZ302EAC
a06d3a930973 can: mcp251x: add error handling for power enable in open and resume
06d4938e41d6 ASoC: SOF: topology: reject invalid vendor array size in token parser
c5dfe0fb6a43 ASoC: amd: yc: Add DMI quirk for Thin A15 B7VF
6e539907c0d1 Bluetooth: hci_sync: annotate data-races around hdev->req_status
ec010891da57 ALSA: asihpi: avoid write overflow check warning
c7630d574e33 media: rkvdec: reduce stack usage in rkvdec_init_v4l2_vp9_count_tbl()
545206174816 ALSA: hda/realtek: Add quirk for ASUS ROG Flow Z13-KJP GZ302EAC
e3c263cb6e28 ALSA: hda/realtek: Add HP ENVY Laptop 13-ba0xxx quirk
dcc2ab487da1 ASoC: amd: yc: Add DMI quirk for ASUS EXPERTBOOK BM1403CDA
66964118f1f5 RDMA/irdma: Fix double free related to rereg_user_mr
d75ae3350fe8 Linux 6.12.82
b731aca06387 x86/CPU: Fix FPDSS on Zen1
ed918050c9ec ALSA: hda/hdmi: Add quirk for TUXEDO IBS14G6
60313768a8ed net: skb: fix cross-cache free of KFENCE-allocated skb head
e9c369d58785 rxrpc: Fix missing error checks for rxkad encryption/decryption failure
57cf7625db25 rxrpc: Fix key/keyring checks in setsockopt(RXRPC_SECURITY_KEY/KEYRING)
12de9e0e0b0b rxrpc: fix reference count leak in rxrpc_server_keyring()
a149dcae2330 rxrpc: reject undecryptable rxkad response tickets
0c156aff8a2d rxrpc: Only put the call ref if one was acquired
e6b7943c5dc8 rxrpc: Fix key reference count leak from call->key
c63abf25203b rxrpc: Fix call removal to use RCU safe deletion
502ff04fa3aa rxrpc: Fix anonymous key handling
691082c0b93c net: lan966x: fix use-after-free and leak in lan966x_fdma_reload()
73e940c4249d net: lan966x: fix page pool leak in error paths
305832c53551 net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool()
116cface1b13 idpf: set the payload size before calling the async handler
6911b7e365bf idpf: improve locking around idpf_vc_xn_push_free()
633ab680c405 mm: filemap: fix nr_pages calculation overflow in filemap_map_pages()
2c91b3991227 net: stmmac: fix integer underflow in chain mode
546cfc65c4bf net: qualcomm: qca_uart: report the consumed byte on RX skb allocation failure
53f2642d77ab mmc: vub300: fix NULL-deref on disconnect
3086374e8bc7 pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled
a1a416134fc1 net/mlx5: Update the list of the PCI supported devices
fe3b2f2084b1 drm/i915/psr: Do not use pipe_src as borders for SU area
a00e92bf6583 drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat
7962b5222226 batman-adv: hold claim backbone gateways by reference
9f3ec44aeb58 net: altera-tse: fix skb leak on DMA mapping error in tse_start_xmit()
aa9facde6c50 net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption
d20e98c2df93 EDAC/mc: Fix error path ordering in edac_mc_alloc()
30ab358fad0c X.509: Fix out-of-bounds access when parsing extensions
f970646b9a39 batman-adv: reject oversized global TT response buffers
a9495069b43b nfc: pn533: allocate rx skb before consuming bytes
bc7ee8cb8b3f arm64: dts: hisilicon: hi3798cv200: Add missing dma-ranges
53be38076032 arm64: dts: hisilicon: poplar: Correct PCIe reset GPIO polarity
b7ea2a650ac4 arm64: dts: imx8mq-librem5: Bump BUCK1 suspend voltage up to 0.85V
ec5cf6e8a125 Revert "arm64: dts: imx8mq-librem5: Set the DVS voltages lower"
c17a2340d38b platform/x86/intel-uncore-freq: Handle autonomous UFS status bit
77263f053963 wifi: brcmsmac: Fix dma_free_coherent() size
a2ea1ef0167d tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG
eda30846ea54 xfrm: clear trailing padding in build_polexpire()
36a36105d957 workqueue: Add pool_workqueue to pending_pwqs list when unplugging multiple inactive works
aa7cfa16f98f netfilter: nft_ct: fix use-after-free in timeout object destroy
c1678b76541b LoongArch: Handle percpu handler address for ORC unwinder
a9f522e12df8 LoongArch: Remove unnecessary checks for ORC unwinder
c494448bb522 net: annotate data-races around sk->sk_{data_ready,write_space}
96bfd850d5d3 Revert "mptcp: add needs_id for netlink appending addr"
ca685511f7af sched_ext: Fix stale direct dispatch state in ddsp_dsq_id
038cb4a94ed0 misc: fastrpc: check qcom_scm_assign_mem() return in rpmsg_probe
7854c0f118d8 arm64: dts: renesas: white-hawk-cpu-common: Add pin control for DSI-eDP IRQ
702029337b05 nfc: nci: complete pending data exchange on device close
e5584932ac1d blktrace: fix __this_cpu_read/write in preemptible context
4125a194db4a btrfs: fix incorrect return value after changing leaf in lookup_extent_data_ref()
42995e4e034b btrfs: remove pointless out labels from extent-tree.c
8a340c39a33a btrfs: remove unused flag EXTENT_BUFFER_CORRUPT
70d34bd2a35c btrfs: remove unused flag EXTENT_BUFFER_READAHEAD
3e6ac6c4b395 btrfs: split waiting from read_extent_buffer_pages(), drop parameter wait
00f0fbd71440 btrfs: remove unused define WAIT_PAGE_LOCK for extent io
781da277d05c btrfs: make wait_on_extent_buffer_writeback() static inline
16a49e3fda33 ASoC: simple-card-utils: Don't use __free(device_node) at graph_util_parse_dai()
5bc51bc77f22 MIPS: mm: Rewrite TLB uniquification for the hidden bit feature
497f7f978946 MIPS: mm: Suppress TLB uniquification on EHINV hardware
d937204d13f9 MIPS: Always record SEGBITS in cpu_data.vmbits
b8acc3914594 Input: uinput - take event lock when submitting FF request "event"
a3d6c9c053c9 Input: uinput - fix circular locking dependency with ff-core
6305ad032b03 seg6: separate dst_cache for input and output paths in seg6 lwtunnel
eb9c6aeb512f mptcp: fix slab-use-after-free in __inet_lookup_established
82843afc1901 net: rfkill: prevent unlimited numbers of rfkill events from being created
ff5ee5073023 xfrm_user: fix info leak in build_report()
b245db719bc7 wifi: rt2x00usb: fix devres lifetime
632544de0fd9 usb: typec: ucsi: skip connector validation before init
1d761e5a7340 lib/crypto: chacha: Zeroize permuted_state before it leaves scope
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/linux-yocto-rt_6.12.bb | 6 ++--
.../linux/linux-yocto-tiny_6.12.bb | 6 ++--
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++----------
3 files changed, 20 insertions(+), 20 deletions(-)
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
index 5a7d17c21e..03cd397db0 100644
--- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb
@@ -15,13 +15,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "4277a7a5b623fcf652c3c73d77baa1fc15c1faf4"
-SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778"
+SRCREV_machine ?= "151d19206b5cd4a4cf6fd3ec8939463bf30d4b6b"
+SRCREV_meta ?= "1a28be589c9aa79335563af67fbce0dadf570537"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
-LINUX_VERSION ?= "6.12.81"
+LINUX_VERSION ?= "6.12.83"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
index 533da7130b..802205b38d 100644
--- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb
@@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc
include recipes-kernel/linux/cve-exclusion.inc
include recipes-kernel/linux/cve-exclusion_6.12.inc
-LINUX_VERSION ?= "6.12.81"
+LINUX_VERSION ?= "6.12.83"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
-SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778"
+SRCREV_machine ?= "f35602ea0c4f5b913a843251bc60949f65fda47c"
+SRCREV_meta ?= "1a28be589c9aa79335563af67fbce0dadf570537"
PV = "${LINUX_VERSION}+git"
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
index e48084fcd3..3e91d22469 100644
--- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb
+++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb
@@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base"
KBRANCH:qemuloongarch64 ?= "v6.12/standard/base"
KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "54a370021957bfa24b4580a75518248174890205"
-SRCREV_machine:qemuarm64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
-SRCREV_machine:qemuloongarch64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
-SRCREV_machine:qemumips ?= "0b864eeca749237236d8ec10e7ed373958f497c4"
-SRCREV_machine:qemuppc ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
-SRCREV_machine:qemuriscv64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
-SRCREV_machine:qemuriscv32 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
-SRCREV_machine:qemux86 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
-SRCREV_machine:qemux86-64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
-SRCREV_machine:qemumips64 ?= "20f68d6b803a62b9bd958a453a669cd9ac75d22a"
-SRCREV_machine ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5"
-SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778"
+SRCREV_machine:qemuarm ?= "429bd391e936b7a9d8164b1446d9c2e591680af4"
+SRCREV_machine:qemuarm64 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c"
+SRCREV_machine:qemuloongarch64 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c"
+SRCREV_machine:qemumips ?= "4c9c4e63b8b075890e9837591cb3b5aa87599938"
+SRCREV_machine:qemuppc ?= "f35602ea0c4f5b913a843251bc60949f65fda47c"
+SRCREV_machine:qemuriscv64 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c"
+SRCREV_machine:qemuriscv32 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c"
+SRCREV_machine:qemux86 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c"
+SRCREV_machine:qemux86-64 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c"
+SRCREV_machine:qemumips64 ?= "aab15ddcde0fa7d8e367a6488ff5206fc12679ee"
+SRCREV_machine ?= "f35602ea0c4f5b913a843251bc60949f65fda47c"
+SRCREV_meta ?= "1a28be589c9aa79335563af67fbce0dadf570537"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "e7a3953084a7050ca349010deb22546834c2e196"
+SRCREV_machine:class-devupstream ?= "eefc95626b5cb02ea6268d1ae58237768004a60d"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v6.12/base"
@@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "6.12.81"
+LINUX_VERSION ?= "6.12.83"
PV = "${LINUX_VERSION}+git"
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 18/18] linux-yocto/6.12: update CVE exclusions (6.12.83)
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (16 preceding siblings ...)
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 17/18] linux-yocto/6.12: update to v6.12.83 bruce.ashfield
@ 2026-04-23 15:45 ` bruce.ashfield
2026-04-24 15:00 ` [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 Yoann Congal
18 siblings, 0 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 9101 changes (4 new | 9097 updated): - 4 new CVEs: CVE-2025-70994, CVE-2026-35225, CVE-2026-41460, CVE-2026-41461 - 9097 updated CVEs: CVE-2018-25259, CVE-2018-25267, CVE-2022-41650, CVE-2022-43472, CVE-2022-44578, CVE-2022-45806, CVE-2022-45819, CVE-2022-45832, CVE-2022-45840, CVE-2022-45841, CVE-2022-46795, CVE-2022-46796, CVE-2022-46807, CVE-2022-46811, CVE-2022-46838, CVE-2022-46840, CVE-2022-46846, CVE-2022-47168, CVE-2022-47176, CVE-2022-47182, CVE-2022-47429, CVE-2022-47594, CVE-2022-47601, CVE-2023-22697, CVE-2023-22701, CVE-2023-22708, CVE-2023-23715, CVE-2023-23716, CVE-2023-23725, CVE-2023-23726, CVE-2023-23729, CVE-2023-23814, CVE-2023-23823, CVE-2023-23825, CVE-2023-23834, CVE-2023-23868, CVE-2023-23886, CVE-2023-23887, CVE-2023-23893, CVE-2023-23895, CVE-2023-23975, CVE-2023-23986, CVE-2023-23987, CVE-2023-23989, CVE-2023-24375, CVE-2023-24407, CVE-2023-25026, CVE-2023-25035, CVE-2023-25037, CVE-2023-25048, CVE-2023-25060, CVE-2023-25067, CVE-2023-25068, CVE-2023-25445, CVE-2023-25446, CVE-2023-25454, CVE-2023-25455, CVE-2023-25469, CVE-2023-25486, CVE-2023-25703, CVE-2023-25714, CVE-2023-25791, CVE-2023-25959, CVE-2023-25966, CVE-2023-25988, CVE-2023-25993, CVE-2023-25995, CVE-2023-25997, CVE-2023-25998, CVE-2023-25999, CVE-2023-26000, CVE-2023-26001, CVE-2023-26002, CVE-2023-26003, CVE-2023-26005, CVE-2023-26520, CVE-2023-26522, CVE-2023-27428, CVE-2023-27449, CVE-2023-27454, CVE-2023-27456, CVE-2023-27609, CVE-2023-27625, CVE-2023-27626, CVE-2023-28165, CVE-2023-28168, CVE-2023-28416, CVE-2023-28417, CVE-2023-28532, CVE-2023-28534, CVE-2023-28536, CVE-2023-28619, CVE-2023-28689, CVE-2023-28990, CVE-2023-29173, CVE-2023-29235, CVE-2023-29237, CVE-2023-29239, CVE-2023-29422, CVE-2023-29429, CVE-2023-29431, CVE-2023-29433, CVE-2023-30476, CVE-2023-30479, CVE-2023-30486, CVE-2023-30488, CVE-2023-30490, CVE-2023-30783, CVE-2023-30870, CVE-2023-30873, CVE-2023-30874, CVE-2023-31073, CVE-2023-31078, CVE-2023-31214, CVE-2023-32094, CVE-2023-32117, CVE-2023-32126, CVE-2023-32240, CVE-2023-32293, CVE-2023-32299, CVE-2023-32506, CVE-2023-32507, CVE-2023-32519, CVE-2023-32520, CVE-2023-32574, CVE-2023-32581, CVE-2023-32585, CVE-2023-32586, CVE-2023-32593, CVE-2023-32599, CVE-2023-32601, CVE-2023-32798, CVE-2023-32963, CVE-2023-33215, CVE-2023-33324, CVE-2023-33928, CVE-2023-33994, CVE-2023-33995, CVE-2023-33996, CVE-2023-33998, CVE-2023-34009, CVE-2023-34014, CVE-2023-34019, CVE-2023-34376, CVE-2023-34381, CVE-2023-34387, CVE-2023-35037, CVE-2023-35040, CVE-2023-35046, CVE-2023-35051, CVE-2023-35052, CVE-2023-35091, CVE-2023-35777, CVE-2023-35875, CVE-2023-36385, CVE-2023-36506, CVE-2023-36509, CVE-2023-36510, CVE-2023-36518, CVE-2023-36519, CVE-2023-36526, CVE-2023-36528, CVE-2023-36531, CVE-2023-36680, CVE-2023-36681, CVE-2023-37885, CVE-2023-37886, CVE-2023-37887, CVE-2023-37967, CVE-2023-37969, CVE-2023-37971, CVE-2023-37984, CVE-2023-37987, CVE-2023-37989, CVE-2023-38383, CVE-2023-38385, CVE-2023-38475, CVE-2023-38477, CVE-2023-38479, CVE-2023-38480, CVE-2023-38483, CVE-2023-38512, CVE-2023-38514, CVE-2023-39305, CVE-2023-39920, CVE-2023-39994, CVE-2023-39995, CVE-2023-39996, CVE-2023-39997, CVE-2023-40001, CVE-2023-40003, CVE-2023-40005, CVE-2023-40011, CVE-2023-40203, CVE-2023-40205, CVE-2023-40209, CVE-2023-40213, CVE-2023-40331, CVE-2023-40334, CVE-2023-40670, CVE-2023-40678, CVE-2023-41130, CVE-2023-41132, CVE-2023-41133, CVE-2023-41649, CVE-2023-41664, CVE-2023-41671, CVE-2023-41683, CVE-2023-41686, CVE-2023-41688, CVE-2023-41689, CVE-2023-41690, CVE-2023-41695, CVE-2023-41729, CVE-2023-41730, CVE-2023-41802, CVE-2023-41803, CVE-2023-41848, CVE-2023-41849, CVE-2023-41857, CVE-2023-41862, CVE-2023-41865, CVE-2023-41866, CVE-2023-41869, CVE-2023-41870, CVE-2023-41873, CVE-2023-41875, CVE-2023-41951, CVE-2023-41952, CVE-2023-44142, CVE-2023-44147, CVE-2023-44149, CVE-2023-44258, CVE-2023-44988, CVE-2023-45002, CVE-2023-45045, CVE-2023-45061, CVE-2023-45101, CVE-2023-45104, CVE-2023-45110, CVE-2023-45271, CVE-2023-45272, CVE-2023-45275, CVE-2023-45631, CVE-2023-45633, CVE-2023-45636, CVE-2023-45649, CVE-2023-45760, CVE-2023-45765, CVE-2023-45766, CVE-2023-45828, CVE-2023-46073, CVE-2023-46079, CVE-2023-46080, CVE-2023-46082, CVE-2023-46083, CVE-2023-46188, CVE-2023-46195, CVE-2023-46196, CVE-2023-46203, CVE-2023-46206, CVE-2023-46309, CVE-2023-46605, CVE-2023-46606, CVE-2023-46607, CVE-2023-46608, CVE-2023-46609, CVE-2023-46610, CVE-2023-46611, CVE-2023-46612, CVE-2023-46616, CVE-2023-46628, CVE-2023-46631, CVE-2023-46632, CVE-2023-46633, CVE-2023-46635, CVE-2023-46637, CVE-2023-46639, CVE-2023-46644, CVE-2023-47179, CVE-2023-47180, CVE-2023-47183, CVE-2023-47187, CVE-2023-47188, CVE-2023-47224, CVE-2023-47225, CVE-2023-47241, CVE-2023-47515, CVE-2023-47517, CVE-2023-47523, CVE-2023-47525, CVE-2023-47557, CVE-2023-47647, CVE-2023-47648, CVE-2023-47661, CVE-2023-47689, CVE-2023-47692, CVE-2023-47693, CVE-2023-47694, CVE-2023-47698, CVE-2023-47756, CVE-2023-47759, CVE-2023-47760, CVE-2023-47761, CVE-2023-47762, CVE-2023-47763, CVE-2023-47764, CVE-2023-47776, CVE-2023-47778, CVE-2023-47780, CVE-2023-47793, CVE-2023-47805, CVE-2023-47807, CVE-2023-47820, CVE-2023-47823, CVE-2023-47826, CVE-2023-47830, CVE-2023-47832, CVE-2023-47836, CVE-2023-47838, CVE-2023-47841, CVE-2023-47847, CVE-2023-47849, CVE-2023-47869, CVE-2023-47871, CVE-2023-48274, CVE-2023-48277, CVE-2023-48286, CVE-2023-48287, CVE-2023-48324, CVE-2023-48332, CVE-2023-48739, CVE-2023-48740, CVE-2023-48750, CVE-2023-48758, CVE-2023-48774, CVE-2023-48775, CVE-2023-48776, CVE-2023-48779, CVE-2023-49154, CVE-2023-49156, CVE-2023-49158, CVE-2023-49167, CVE-2023-49192, CVE-2023-49193, CVE-2023-49194, CVE-2023-49196, CVE-2023-49754, CVE-2023-49755, CVE-2023-49756, CVE-2023-49757, CVE-2023-49758, CVE-2023-49817, CVE-2023-49818, CVE-2023-49831, CVE-2023-49832, CVE-2023-49835, CVE-2023-49845, CVE-2023-49848, CVE-2023-49849, CVE-2023-49850, CVE-2023-49851, CVE-2023-49856, CVE-2023-49857, CVE-2023-49858, CVE-2023-49859, CVE-2023-49861, CVE-2023-50373, CVE-2023-50375, CVE-2023-50850, CVE-2023-50854, CVE-2023-50876, CVE-2023-50877, CVE-2023-50882, CVE-2023-50884, CVE-2023-50887, CVE-2023-50899, CVE-2023-50903, CVE-2023-50904, CVE-2023-50905, CVE-2023-51353, CVE-2023-51355, CVE-2023-51357, CVE-2023-51359, CVE-2023-51360, CVE-2023-51362, CVE-2023-51484, CVE-2023-51486, CVE-2023-52135, CVE-2023-52190, CVE-2024-10676, CVE-2024-11402, CVE-2024-1435, CVE-2024-22145, CVE-2024-22162, CVE-2024-22289, CVE-2024-22307, CVE-2024-23500, CVE-2024-23506, CVE-2024-23507, CVE-2024-24831, CVE-2024-24833, CVE-2024-24871, CVE-2024-24878, CVE-2024-25100, CVE-2024-25599, CVE-2024-25932, CVE-2024-27188, CVE-2024-27193, CVE-2024-27195, CVE-2024-27949, CVE-2024-27950, CVE-2024-27965, CVE-2024-27971, CVE-2024-27987, CVE-2024-27993, CVE-2024-27994, CVE-2024-27997, CVE-2024-27998, CVE-2024-28000, CVE-2024-29093, CVE-2024-29095, CVE-2024-29125, CVE-2024-29134, CVE-2024-29136, CVE-2024-29137, CVE-2024-29138, CVE-2024-29777, CVE-2024-29792, CVE-2024-29921, CVE-2024-29931, CVE-2024-2889, CVE-2024-30178, CVE-2024-30182, CVE-2024-30193, CVE-2024-30194, CVE-2024-30197, CVE-2024-30199, CVE-2024-30221, CVE-2024-30229, CVE-2024-30236, CVE-2024-30238, CVE-2024-30244, CVE-2024-30245, CVE-2024-30422, CVE-2024-30424, CVE-2024-30425, CVE-2024-30428, CVE-2024-30435, CVE-2024-30488, CVE-2024-30493, CVE-2024-30503, CVE-2024-30505, CVE-2024-30529, CVE-2024-30534, CVE-2024-31246, CVE-2024-31281, CVE-2024-31303, CVE-2024-31359, CVE-2024-31373, CVE-2024-31374, CVE-2024-31376, CVE-2024-31382, CVE-2024-31421, CVE-2024-31424, CVE-2024-31433, CVE-2024-31924, CVE-2024-31929, CVE-2024-31942, CVE-2024-32082, CVE-2024-32090, CVE-2024-32101, CVE-2024-32126, CVE-2024-32140, CVE-2024-32141, CVE-2024-32433, CVE-2024-32435, CVE-2024-32444, CVE-2024-32445, CVE-2024-32505, CVE-2024-32507, CVE-2024-32523, CVE-2024-32553, CVE-2024-32555, CVE-2024-32564, CVE-2024-32566, CVE-2024-32568, CVE-2024-32573, CVE-2024-32589, CVE-2024-32599, CVE-2024-32679, CVE-2024-32698, CVE-2024-32699, CVE-2024-32701, CVE-2024-32702, CVE-2024-32703, CVE-2024-32704, CVE-2024-32705, CVE-2024-32706, CVE-2024-32711, CVE-2024-32719, CVE-2024-32725, CVE-2024-32778, CVE-2024-32782, CVE-2024-32791, CVE-2024-32792, CVE-2024-32796, CVE-2024-32810, CVE-2024-32815, CVE-2024-32817, CVE-2024-32824, CVE-2024-32825, CVE-2024-32832, CVE-2024-32836, CVE-2024-32956, CVE-2024-32959, CVE-2024-32961, CVE-2024-33568, CVE-2024-33570, CVE-2024-33571, CVE-2024-33572, CVE-2024-33648, CVE-2024-33678, CVE-2024-33689, CVE-2024-33907, CVE-2024-33939, CVE-2024-34371, CVE-2024-34373, CVE-2024-34385, CVE-2024-34438, CVE-2024-34443, CVE-2024-34444, CVE-2024-34546, CVE-2024-34556, CVE-2024-34557, CVE-2024-34569, CVE-2024-34757, CVE-2024-34763, CVE-2024-34770, CVE-2024-34794, CVE-2024-34795, CVE-2024-34800, CVE-2024-34801, CVE-2024-34807, CVE-2024-34812, CVE-2024-34813, CVE-2024-34814, CVE-2024-34815, CVE-2024-34819, CVE-2024-34821, CVE-2024-34826, CVE-2024-34828, CVE-2024-35169, CVE-2024-35172, CVE-2024-35633, CVE-2024-35637, CVE-2024-35639, CVE-2024-35645, CVE-2024-35646, CVE-2024-35650, CVE-2024-35653, CVE-2024-35655, CVE-2024-35659, CVE-2024-35664, CVE-2024-35674, CVE-2024-35679, CVE-2024-35680, CVE-2024-35684, CVE-2024-35693, CVE-2024-35694, CVE-2024-35698, CVE-2024-35700, CVE-2024-35709, CVE-2024-35723, CVE-2024-35729, CVE-2024-35732, CVE-2024-35739, CVE-2024-35759, CVE-2024-35760, CVE-2024-35764, CVE-2024-35768, CVE-2024-35769, CVE-2024-37093, CVE-2024-37102, CVE-2024-37103, CVE-2024-37104, CVE-2024-37114, CVE-2024-37202, CVE-2024-37213, CVE-2024-37228, CVE-2024-37235, CVE-2024-37236, CVE-2024-37237, CVE-2024-37238, CVE-2024-37239, CVE-2024-37240, CVE-2024-37241, CVE-2024-37242, CVE-2024-37243, CVE-2024-37255, CVE-2024-37259, CVE-2024-37261, CVE-2024-37270, CVE-2024-37271, CVE-2024-37272, CVE-2024-37274, CVE-2024-37275, CVE-2024-37409, CVE-2024-37410, CVE-2024-37411, CVE-2024-37412, CVE-2024-37413, CVE-2024-37415, CVE-2024-37417, CVE-2024-37421, CVE-2024-37422, CVE-2024-37426, CVE-2024-37429, CVE-2024-37430, CVE-2024-37431, CVE-2024-37433, CVE-2024-37434, CVE-2024-37435, CVE-2024-37437, CVE-2024-37438, CVE-2024-37440, CVE-2024-37441, CVE-2024-37444, CVE-2024-37448, CVE-2024-37449, CVE-2024-37450, CVE-2024-37451, CVE-2024-37452, CVE-2024-37458, CVE-2024-37467, CVE-2024-37472, CVE-2024-37473, CVE-2024-37478, CVE-2024-37481, CVE-2024-37482, CVE-2024-37483, CVE-2024-37488, CVE-2024-37490, CVE-2024-37491, CVE-2024-37493, CVE-2024-37495, CVE-2024-37497, CVE-2024-37502, CVE-2024-37503, CVE-2024-37508, CVE-2024-37511, CVE-2024-37518, CVE-2024-37519, CVE-2024-37520, CVE-2024-37540, CVE-2024-37541, CVE-2024-37543, CVE-2024-37544, CVE-2024-37554, CVE-2024-37555, CVE-2024-37560, CVE-2024-37918, CVE-2024-37922, CVE-2024-37923, CVE-2024-37925, CVE-2024-37929, CVE-2024-37930, CVE-2024-37931, CVE-2024-37937, CVE-2024-37943, CVE-2024-37945, CVE-2024-37946, CVE-2024-37962, CVE-2024-38687, CVE-2024-38691, CVE-2024-38706, CVE-2024-38708, CVE-2024-38712, CVE-2024-38714, CVE-2024-38729, CVE-2024-38731, CVE-2024-38732, CVE-2024-38735, CVE-2024-38751, CVE-2024-38753, CVE-2024-38754, CVE-2024-38762, CVE-2024-38763, CVE-2024-38764, CVE-2024-38765, CVE-2024-38766, CVE-2024-38771, CVE-2024-38778, CVE-2024-38787, CVE-2024-38789, CVE-2024-38790, CVE-2024-38795, CVE-2024-39619, CVE-2024-39620, CVE-2024-39621, CVE-2024-39622, CVE-2024-39623, CVE-2024-39624, CVE-2024-39626, CVE-2024-39631, CVE-2024-39637, CVE-2024-39646, CVE-2024-39647, CVE-2024-39649, CVE-2024-39654, CVE-2024-39663, CVE-2024-43117, CVE-2024-43118, CVE-2024-43136, CVE-2024-43153, CVE-2024-43158, CVE-2024-43159, CVE-2024-43208, CVE-2024-43214, CVE-2024-43216, CVE-2024-43218, CVE-2024-43222, CVE-2024-43228, CVE-2024-43229, CVE-2024-43230, CVE-2024-43237, CVE-2024-43238, CVE-2024-43239, CVE-2024-43240, CVE-2024-43241, CVE-2024-43243, CVE-2024-43252, CVE-2024-43253, CVE-2024-43254, CVE-2024-43255, CVE-2024-43259, CVE-2024-43264, CVE-2024-43266, CVE-2024-43283, CVE-2024-43290, CVE-2024-43299, CVE-2024-43300, CVE-2024-43306, CVE-2024-43313, CVE-2024-43318, CVE-2024-43333, CVE-2024-43334, CVE-2024-43336, CVE-2024-43338, CVE-2024-43349, CVE-2024-43353, CVE-2024-43927, CVE-2024-43932, CVE-2024-43933, CVE-2024-43938, CVE-2024-43944, CVE-2024-43953, CVE-2024-43954, CVE-2024-43955, CVE-2024-43956, CVE-2024-43959, CVE-2024-43971, CVE-2024-43973, CVE-2024-43975, CVE-2024-43976, CVE-2024-43977, CVE-2024-43978, CVE-2024-43989, CVE-2024-44000, CVE-2024-44001, CVE-2024-44002, CVE-2024-44003, CVE-2024-44004, CVE-2024-44005, CVE-2024-44006, CVE-2024-44007, CVE-2024-44008, CVE-2024-44009, CVE-2024-44010, CVE-2024-44011, CVE-2024-44012, CVE-2024-44013, CVE-2024-44014, CVE-2024-44015, CVE-2024-44016, CVE-2024-44017, CVE-2024-44018, CVE-2024-44019, CVE-2024-44020, CVE-2024-44021, CVE-2024-44022, CVE-2024-44023, CVE-2024-44024, CVE-2024-44025, CVE-2024-44026, CVE-2024-44027, CVE-2024-44028, CVE-2024-44029, CVE-2024-44030, CVE-2024-44031, CVE-2024-44032, CVE-2024-44033, CVE-2024-44034, CVE-2024-44035, CVE-2024-44036, CVE-2024-44037, CVE-2024-44038, CVE-2024-44039, CVE-2024-44040, CVE-2024-44041, CVE-2024-44042, CVE-2024-44043, CVE-2024-44044, CVE-2024-44045, CVE-2024-44046, CVE-2024-44047, CVE-2024-44048, CVE-2024-44049, CVE-2024-44050, CVE-2024-44051, CVE-2024-44052, CVE-2024-44055, CVE-2024-44059, CVE-2024-44061, CVE-2024-44064, CVE-2024-45451, CVE-2024-45452, CVE-2024-45453, CVE-2024-45454, CVE-2024-45455, CVE-2024-45456, CVE-2024-45457, CVE-2024-45458, CVE-2024-45459, CVE-2024-45460, CVE-2024-47297, CVE-2024-47298, CVE-2024-47299, CVE-2024-47300, CVE-2024-47301, CVE-2024-47302, CVE-2024-47303, CVE-2024-47304, CVE-2024-47305, CVE-2024-47306, CVE-2024-47307, CVE-2024-47308, CVE-2024-47309, CVE-2024-47310, CVE-2024-47311, CVE-2024-47312, CVE-2024-47313, CVE-2024-47314, CVE-2024-47315, CVE-2024-47316, CVE-2024-47317, CVE-2024-47318, CVE-2024-47319, CVE-2024-47320, CVE-2024-47321, CVE-2024-47322, CVE-2024-47323, CVE-2024-47324, CVE-2024-47325, CVE-2024-47326, CVE-2024-47327, CVE-2024-47328, CVE-2024-47329, CVE-2024-47331, CVE-2024-47332, CVE-2024-47333, CVE-2024-47334, CVE-2024-47335, CVE-2024-47336, CVE-2024-47337, CVE-2024-47338, CVE-2024-47339, CVE-2024-47340, CVE-2024-47341, CVE-2024-47342, CVE-2024-47343, CVE-2024-47344, CVE-2024-47345, CVE-2024-47346, CVE-2024-47347, CVE-2024-47348, CVE-2024-47349, CVE-2024-47350, CVE-2024-47351, CVE-2024-47352, CVE-2024-47353, CVE-2024-47354, CVE-2024-47355, CVE-2024-47356, CVE-2024-47357, CVE-2024-47358, CVE-2024-47359, CVE-2024-47360, CVE-2024-47361, CVE-2024-47362, CVE-2024-47363, CVE-2024-47364, CVE-2024-47365, CVE-2024-47366, CVE-2024-47367, CVE-2024-47368, CVE-2024-47369, CVE-2024-47370, CVE-2024-47371, CVE-2024-47372, CVE-2024-47373, CVE-2024-47374, CVE-2024-47375, CVE-2024-47376, CVE-2024-47377, CVE-2024-47378, CVE-2024-47379, CVE-2024-47380, CVE-2024-47381, CVE-2024-47382, CVE-2024-47383, CVE-2024-47384, CVE-2024-47385, CVE-2024-47386, CVE-2024-47387, CVE-2024-47388, CVE-2024-47389, CVE-2024-47390, CVE-2024-47391, CVE-2024-47392, CVE-2024-47393, CVE-2024-47394, CVE-2024-47395, CVE-2024-47396, CVE-2024-47621, CVE-2024-47622, CVE-2024-47623, CVE-2024-47624, CVE-2024-47625, CVE-2024-47626, CVE-2024-47627, CVE-2024-47628, CVE-2024-47629, CVE-2024-47630, CVE-2024-47631, CVE-2024-47632, CVE-2024-47633, CVE-2024-47634, CVE-2024-47635, CVE-2024-47636, CVE-2024-47637, CVE-2024-47638, CVE-2024-47639, CVE-2024-47640, CVE-2024-47641, CVE-2024-47642, CVE-2024-47643, CVE-2024-47644, CVE-2024-47645, CVE-2024-47646, CVE-2024-47647, CVE-2024-47648, CVE-2024-47649, CVE-2024-47650, CVE-2024-48020, CVE-2024-48021, CVE-2024-48022, CVE-2024-48023, CVE-2024-48024, CVE-2024-48025, CVE-2024-48026, CVE-2024-48027, CVE-2024-48028, CVE-2024-48029, CVE-2024-48030, CVE-2024-48031, CVE-2024-48032, CVE-2024-48033, CVE-2024-48034, CVE-2024-48035, CVE-2024-48036, CVE-2024-48037, CVE-2024-48038, CVE-2024-48039, CVE-2024-48040, CVE-2024-48041, CVE-2024-48042, CVE-2024-48043, CVE-2024-48044, CVE-2024-48045, CVE-2024-48046, CVE-2024-48047, CVE-2024-48048, CVE-2024-48049, CVE-2024-49222, CVE-2024-49225, CVE-2024-49228, CVE-2024-49229, CVE-2024-49231, CVE-2024-49232, CVE-2024-49233, CVE-2024-49234, CVE-2024-49236, CVE-2024-49237, CVE-2024-49241, CVE-2024-49243, CVE-2024-49249, CVE-2024-49250, CVE-2024-49251, CVE-2024-49252, CVE-2024-49254, CVE-2024-49255, CVE-2024-49256, CVE-2024-49257, CVE-2024-49258, CVE-2024-49259, CVE-2024-49260, CVE-2024-49261, CVE-2024-49262, CVE-2024-49263, CVE-2024-49264, CVE-2024-49265, CVE-2024-49266, CVE-2024-49267, CVE-2024-49268, CVE-2024-49270, CVE-2024-49271, CVE-2024-49272, CVE-2024-49273, CVE-2024-49274, CVE-2024-49275, CVE-2024-49276, CVE-2024-49277, CVE-2024-49278, CVE-2024-49279, CVE-2024-49280, CVE-2024-49281, CVE-2024-49282, CVE-2024-49283, CVE-2024-49284, CVE-2024-49285, CVE-2024-49286, CVE-2024-49287, CVE-2024-49288, CVE-2024-49289, CVE-2024-49290, CVE-2024-49291, CVE-2024-49292, CVE-2024-49293, CVE-2024-49294, CVE-2024-49295, CVE-2024-49296, CVE-2024-49297, CVE-2024-49298, CVE-2024-49299, CVE-2024-49300, CVE-2024-49301, CVE-2024-49302, CVE-2024-49303, CVE-2024-49304, CVE-2024-49305, CVE-2024-49306, CVE-2024-49307, CVE-2024-49308, CVE-2024-49309, CVE-2024-49310, CVE-2024-49311, CVE-2024-49312, CVE-2024-49313, CVE-2024-49316, CVE-2024-49318, CVE-2024-49319, CVE-2024-49320, CVE-2024-49323, CVE-2024-49324, CVE-2024-49325, CVE-2024-49326, CVE-2024-49327, CVE-2024-49328, CVE-2024-49329, CVE-2024-49330, CVE-2024-49331, CVE-2024-49332, CVE-2024-49333, CVE-2024-49334, CVE-2024-49335, CVE-2024-49604, CVE-2024-49605, CVE-2024-49606, CVE-2024-49607, CVE-2024-49608, CVE-2024-49609, CVE-2024-49610, CVE-2024-49611, CVE-2024-49612, CVE-2024-49613, CVE-2024-49614, CVE-2024-49615, CVE-2024-49616, CVE-2024-49617, CVE-2024-49618, CVE-2024-49619, CVE-2024-49620, CVE-2024-49621, CVE-2024-49622, CVE-2024-49623, CVE-2024-49624, CVE-2024-49627, CVE-2024-49628, CVE-2024-49629, CVE-2024-49630, CVE-2024-49631, CVE-2024-49632, CVE-2024-49633, CVE-2024-49634, CVE-2024-49635, CVE-2024-49636, CVE-2024-49637, CVE-2024-49638, CVE-2024-49639, CVE-2024-49640, CVE-2024-49641, CVE-2024-49642, CVE-2024-49643, CVE-2024-49644, CVE-2024-49645, CVE-2024-49646, CVE-2024-49647, CVE-2024-49648, CVE-2024-49649, CVE-2024-49650, CVE-2024-49651, CVE-2024-49652, CVE-2024-49653, CVE-2024-49654, CVE-2024-49655, CVE-2024-49656, CVE-2024-49657, CVE-2024-49658, CVE-2024-49659, CVE-2024-49660, CVE-2024-49661, CVE-2024-49662, CVE-2024-49663, CVE-2024-49664, CVE-2024-49665, CVE-2024-49666, CVE-2024-49667, CVE-2024-49668, CVE-2024-49669, CVE-2024-49670, CVE-2024-49671, CVE-2024-49672, CVE-2024-49673, CVE-2024-49674, CVE-2024-49675, CVE-2024-49676, CVE-2024-49677, CVE-2024-49678, CVE-2024-49679, CVE-2024-49680, CVE-2024-49681, CVE-2024-49682, CVE-2024-49683, CVE-2024-49684, CVE-2024-49685, CVE-2024-49686, CVE-2024-49687, CVE-2024-49688, CVE-2024-49689, CVE-2024-49690, CVE-2024-49691, CVE-2024-49692, CVE-2024-49693, CVE-2024-49694, CVE-2024-49695, CVE-2024-49696, CVE-2024-49697, CVE-2024-49698, CVE-2024-49699, CVE-2024-49700, CVE-2024-49701, CVE-2024-49702, CVE-2024-49703, CVE-2024-4689, CVE-2024-4746, CVE-2024-50407, CVE-2024-50408, CVE-2024-50409, CVE-2024-50410, CVE-2024-50411, CVE-2024-50412, CVE-2024-50413, CVE-2024-50414, CVE-2024-50415, CVE-2024-50416, CVE-2024-50417, CVE-2024-50418, CVE-2024-50419, CVE-2024-50420, CVE-2024-50421, CVE-2024-50422, CVE-2024-50423, CVE-2024-50424, CVE-2024-50425, CVE-2024-50426, CVE-2024-50427, CVE-2024-50428, CVE-2024-50429, CVE-2024-50430, CVE-2024-50431, CVE-2024-50432, CVE-2024-50433, CVE-2024-50434, CVE-2024-50435, CVE-2024-50436, CVE-2024-50437, CVE-2024-50438, CVE-2024-50439, CVE-2024-50440, CVE-2024-50441, CVE-2024-50442, CVE-2024-50445, CVE-2024-50446, CVE-2024-50447, CVE-2024-50448, CVE-2024-50449, CVE-2024-50450, CVE-2024-50451, CVE-2024-50453, CVE-2024-50454, CVE-2024-50455, CVE-2024-50456, CVE-2024-50457, CVE-2024-50458, CVE-2024-50459, CVE-2024-50460, CVE-2024-50461, CVE-2024-50462, CVE-2024-50463, CVE-2024-50464, CVE-2024-50465, CVE-2024-50467, CVE-2024-50468, CVE-2024-50469, CVE-2024-50470, CVE-2024-50471, CVE-2024-50472, CVE-2024-50473, CVE-2024-50475, CVE-2024-50476, CVE-2024-50477, CVE-2024-50478, CVE-2024-50479, CVE-2024-50480, CVE-2024-50481, CVE-2024-50482, CVE-2024-50483, CVE-2024-50484, CVE-2024-50485, CVE-2024-50486, CVE-2024-50487, CVE-2024-50488, CVE-2024-50489, CVE-2024-50490, CVE-2024-50491, CVE-2024-50492, CVE-2024-50493, CVE-2024-50494, CVE-2024-50495, CVE-2024-50496, CVE-2024-50497, CVE-2024-50498, CVE-2024-50500, CVE-2024-50501, CVE-2024-50502, CVE-2024-50503, CVE-2024-50504, CVE-2024-50506, CVE-2024-50507, CVE-2024-50508, CVE-2024-50509, CVE-2024-50510, CVE-2024-50511, CVE-2024-50512, CVE-2024-50513, CVE-2024-50514, CVE-2024-50515, CVE-2024-50516, CVE-2024-50517, CVE-2024-50518, CVE-2024-50519, CVE-2024-50520, CVE-2024-50521, CVE-2024-50522, CVE-2024-50523, CVE-2024-50524, CVE-2024-50525, CVE-2024-50526, CVE-2024-50527, CVE-2024-50528, CVE-2024-50529, CVE-2024-50530, CVE-2024-50531, CVE-2024-50532, CVE-2024-50533, CVE-2024-50534, CVE-2024-50535, CVE-2024-50536, CVE-2024-50537, CVE-2024-50538, CVE-2024-50539, CVE-2024-50540, CVE-2024-50541, CVE-2024-50542, CVE-2024-50543, CVE-2024-50544, CVE-2024-50545, CVE-2024-50546, CVE-2024-50547, CVE-2024-50548, CVE-2024-50549, CVE-2024-50550, CVE-2024-50551, CVE-2024-50552, CVE-2024-50553, CVE-2024-50554, CVE-2024-50556, CVE-2024-51570, CVE-2024-51571, CVE-2024-51572, CVE-2024-51573, CVE-2024-51574, CVE-2024-51575, CVE-2024-51576, CVE-2024-51577, CVE-2024-51578, CVE-2024-51579, CVE-2024-51580, CVE-2024-51581, CVE-2024-51582, CVE-2024-51583, CVE-2024-51584, CVE-2024-51585, CVE-2024-51586, CVE-2024-51587, CVE-2024-51588, CVE-2024-51589, CVE-2024-51590, CVE-2024-51591, CVE-2024-51592, CVE-2024-51593, CVE-2024-51594, CVE-2024-51595, CVE-2024-51596, CVE-2024-51597, CVE-2024-51598, CVE-2024-51599, CVE-2024-51601, CVE-2024-51602, CVE-2024-51603, CVE-2024-51604, CVE-2024-51605, CVE-2024-51606, CVE-2024-51607, CVE-2024-51608, CVE-2024-51609, CVE-2024-51610, CVE-2024-51611, CVE-2024-51612, CVE-2024-51613, CVE-2024-51614, CVE-2024-51615, CVE-2024-51616, CVE-2024-51617, CVE-2024-51618, CVE-2024-51619, CVE-2024-51620, CVE-2024-51621, CVE-2024-51622, CVE-2024-51623, CVE-2024-51624, CVE-2024-51625, CVE-2024-51626, CVE-2024-51627, CVE-2024-51628, CVE-2024-51629, CVE-2024-51630, CVE-2024-51631, CVE-2024-51632, CVE-2024-51633, CVE-2024-51634, CVE-2024-51635, CVE-2024-51636, CVE-2024-51637, CVE-2024-51638, CVE-2024-51639, CVE-2024-51640, CVE-2024-51641, CVE-2024-51642, CVE-2024-51643, CVE-2024-51644, CVE-2024-51645, CVE-2024-51648, CVE-2024-51649, CVE-2024-51650, CVE-2024-51651, CVE-2024-51652, CVE-2024-51653, CVE-2024-51654, CVE-2024-51655, CVE-2024-51656, CVE-2024-51657, CVE-2024-51658, CVE-2024-51659, CVE-2024-51660, CVE-2024-51661, CVE-2024-51662, CVE-2024-51663, CVE-2024-51664, CVE-2024-51665, CVE-2024-51666, CVE-2024-51667, CVE-2024-51668, CVE-2024-51669, CVE-2024-51670, CVE-2024-51671, CVE-2024-51672, CVE-2024-51673, CVE-2024-51674, CVE-2024-51675, CVE-2024-51676, CVE-2024-51677, CVE-2024-51678, CVE-2024-51679, CVE-2024-51680, CVE-2024-51681, CVE-2024-51682, CVE-2024-51683, CVE-2024-51684, CVE-2024-51685, CVE-2024-51686, CVE-2024-51687, CVE-2024-51688, CVE-2024-51689, CVE-2024-51690, CVE-2024-51691, CVE-2024-51692, CVE-2024-51693, CVE-2024-51694, CVE-2024-51695, CVE-2024-51696, CVE-2024-51697, CVE-2024-51698, CVE-2024-51699, CVE-2024-51700, CVE-2024-51701, CVE-2024-51702, CVE-2024-51703, CVE-2024-51704, CVE-2024-51705, CVE-2024-51706, CVE-2024-51707, CVE-2024-51708, CVE-2024-51709, CVE-2024-51710, CVE-2024-51711, CVE-2024-51712, CVE-2024-51713, CVE-2024-51714, CVE-2024-51715, CVE-2024-51716, CVE-2024-51717, CVE-2024-51718, CVE-2024-51719, CVE-2024-51759, CVE-2024-51760, CVE-2024-51761, CVE-2024-51762, CVE-2024-51763, CVE-2024-51776, CVE-2024-51778, CVE-2024-51779, CVE-2024-51780, CVE-2024-51781, CVE-2024-51782, CVE-2024-51783, CVE-2024-51784, CVE-2024-51785, CVE-2024-51786, CVE-2024-51787, CVE-2024-51788, CVE-2024-51789, CVE-2024-51790, CVE-2024-51791, CVE-2024-51792, CVE-2024-51793, CVE-2024-51794, CVE-2024-51795, CVE-2024-51796, CVE-2024-51797, CVE-2024-51798, CVE-2024-51799, CVE-2024-51800, CVE-2024-51801, CVE-2024-51802, CVE-2024-51803, CVE-2024-51804, CVE-2024-51805, CVE-2024-51806, CVE-2024-51807, CVE-2024-51808, CVE-2024-51809, CVE-2024-51810, CVE-2024-51811, CVE-2024-51812, CVE-2024-51813, CVE-2024-51814, CVE-2024-51815, CVE-2024-51816, CVE-2024-51817, CVE-2024-51818, CVE-2024-51819, CVE-2024-51820, CVE-2024-51821, CVE-2024-51822, CVE-2024-51823, CVE-2024-51824, CVE-2024-51825, CVE-2024-51826, CVE-2024-51827, CVE-2024-51828, CVE-2024-51829, CVE-2024-51830, CVE-2024-51831, CVE-2024-51832, CVE-2024-51833, CVE-2024-51834, CVE-2024-51835, CVE-2024-51836, CVE-2024-51837, CVE-2024-51838, CVE-2024-51839, CVE-2024-51840, CVE-2024-51841, CVE-2024-51842, CVE-2024-51843, CVE-2024-51844, CVE-2024-51845, CVE-2024-51846, CVE-2024-51847, CVE-2024-51848, CVE-2024-51849, CVE-2024-51850, CVE-2024-51851, CVE-2024-51852, CVE-2024-51853, CVE-2024-51854, CVE-2024-51855, CVE-2024-51856, CVE-2024-51857, CVE-2024-51858, CVE-2024-51859, CVE-2024-51860, CVE-2024-51861, CVE-2024-51862, CVE-2024-51863, CVE-2024-51864, CVE-2024-51865, CVE-2024-51866, CVE-2024-51867, CVE-2024-51868, CVE-2024-51869, CVE-2024-51870, CVE-2024-51871, CVE-2024-51872, CVE-2024-51873, CVE-2024-51874, CVE-2024-51875, CVE-2024-51876, CVE-2024-51877, CVE-2024-51878, CVE-2024-51879, CVE-2024-51880, CVE-2024-51881, CVE-2024-51882, CVE-2024-51883, CVE-2024-51884, CVE-2024-51885, CVE-2024-51886, CVE-2024-51887, CVE-2024-51888, CVE-2024-51889, CVE-2024-51890, CVE-2024-51891, CVE-2024-51892, CVE-2024-51893, CVE-2024-51894, CVE-2024-51895, CVE-2024-51896, CVE-2024-51897, CVE-2024-51898, CVE-2024-51899, CVE-2024-51900, CVE-2024-51901, CVE-2024-51902, CVE-2024-51903, CVE-2024-51904, CVE-2024-51905, CVE-2024-51906, CVE-2024-51907, CVE-2024-51908, CVE-2024-51909, CVE-2024-51910, CVE-2024-51911, CVE-2024-51912, CVE-2024-51913, CVE-2024-51914, CVE-2024-51916, CVE-2024-51917, CVE-2024-51918, CVE-2024-51919, CVE-2024-51920, CVE-2024-51921, CVE-2024-51922, CVE-2024-51923, CVE-2024-51924, CVE-2024-51925, CVE-2024-51926, CVE-2024-51927, CVE-2024-51928, CVE-2024-51929, CVE-2024-51930, CVE-2024-51931, CVE-2024-51932, CVE-2024-51933, CVE-2024-51934, CVE-2024-51935, CVE-2024-51936, CVE-2024-51937, CVE-2024-51938, CVE-2024-51939, CVE-2024-51940, CVE-2024-52339, CVE-2024-52340, CVE-2024-52341, CVE-2024-52342, CVE-2024-52343, CVE-2024-52344, CVE-2024-52345, CVE-2024-52346, CVE-2024-52347, CVE-2024-52348, CVE-2024-52349, CVE-2024-52350, CVE-2024-52351, CVE-2024-52352, CVE-2024-52353, CVE-2024-52354, CVE-2024-52355, CVE-2024-52356, CVE-2024-52357, CVE-2024-52358, CVE-2024-52369, CVE-2024-52370, CVE-2024-52371, CVE-2024-52372, CVE-2024-52373, CVE-2024-52374, CVE-2024-52375, CVE-2024-52376, CVE-2024-52377, CVE-2024-52378, CVE-2024-52379, CVE-2024-52380, CVE-2024-52381, CVE-2024-52382, CVE-2024-52383, CVE-2024-52384, CVE-2024-52385, CVE-2024-52386, CVE-2024-52388, CVE-2024-52389, CVE-2024-52390, CVE-2024-52391, CVE-2024-52392, CVE-2024-52393, CVE-2024-52394, CVE-2024-52395, CVE-2024-52396, CVE-2024-52397, CVE-2024-52398, CVE-2024-52399, CVE-2024-52400, CVE-2024-52401, CVE-2024-52402, CVE-2024-52403, CVE-2024-52404, CVE-2024-52405, CVE-2024-52406, CVE-2024-52407, CVE-2024-52408, CVE-2024-52409, CVE-2024-52410, CVE-2024-52411, CVE-2024-52412, CVE-2024-52413, CVE-2024-52414, CVE-2024-52415, CVE-2024-52416, CVE-2024-52417, CVE-2024-52418, CVE-2024-52419, CVE-2024-52420, CVE-2024-52421, CVE-2024-52422, CVE-2024-52423, CVE-2024-52424, CVE-2024-52425, CVE-2024-52426, CVE-2024-52427, CVE-2024-52428, CVE-2024-52429, CVE-2024-52430, CVE-2024-52431, CVE-2024-52432, CVE-2024-52433, CVE-2024-52434, CVE-2024-52435, CVE-2024-52436, CVE-2024-52437, CVE-2024-52438, CVE-2024-52439, CVE-2024-52440, CVE-2024-52441, CVE-2024-52442, CVE-2024-52443, CVE-2024-52444, CVE-2024-52445, CVE-2024-52446, CVE-2024-52447, CVE-2024-52448, CVE-2024-52449, CVE-2024-52450, CVE-2024-52451, CVE-2024-52452, CVE-2024-52453, CVE-2024-52454, CVE-2024-52455, CVE-2024-52456, CVE-2024-52457, CVE-2024-52458, CVE-2024-52459, CVE-2024-52460, CVE-2024-52461, CVE-2024-52462, CVE-2024-52463, CVE-2024-52464, CVE-2024-52465, CVE-2024-52466, CVE-2024-52467, CVE-2024-52468, CVE-2024-52469, CVE-2024-52470, CVE-2024-52471, CVE-2024-52472, CVE-2024-52473, CVE-2024-52474, CVE-2024-52475, CVE-2024-52476, CVE-2024-52477, CVE-2024-52478, CVE-2024-52479, CVE-2024-52482, CVE-2024-52483, CVE-2024-52484, CVE-2024-52485, CVE-2024-52486, CVE-2024-52487, CVE-2024-52489, CVE-2024-52490, CVE-2024-52491, CVE-2024-52492, CVE-2024-52493, CVE-2024-52494, CVE-2024-52495, CVE-2024-52496, CVE-2024-52497, CVE-2024-52498, CVE-2024-52499, CVE-2024-52500, CVE-2024-52501, CVE-2024-52502, CVE-2024-52503, CVE-2024-53707, CVE-2024-53708, CVE-2024-53709, CVE-2024-53710, CVE-2024-53711, CVE-2024-53712, CVE-2024-53713, CVE-2024-53714, CVE-2024-53715, CVE-2024-53716, CVE-2024-53717, CVE-2024-53718, CVE-2024-53719, CVE-2024-53720, CVE-2024-53721, CVE-2024-53722, CVE-2024-53723, CVE-2024-53724, CVE-2024-53725, CVE-2024-53726, CVE-2024-53727, CVE-2024-53728, CVE-2024-53729, CVE-2024-53730, CVE-2024-53731, CVE-2024-53732, CVE-2024-53733, CVE-2024-53734, CVE-2024-53735, CVE-2024-53736, CVE-2024-53737, CVE-2024-53738, CVE-2024-53739, CVE-2024-53740, CVE-2024-53741, CVE-2024-53742, CVE-2024-53743, CVE-2024-53744, CVE-2024-53745, CVE-2024-53746, CVE-2024-53747, CVE-2024-53748, CVE-2024-53749, CVE-2024-53750, CVE-2024-53751, CVE-2024-53752, CVE-2024-53753, CVE-2024-53754, CVE-2024-53755, CVE-2024-53756, CVE-2024-53757, CVE-2024-53758, CVE-2024-53759, CVE-2024-53760, CVE-2024-53761, CVE-2024-53762, CVE-2024-53763, CVE-2024-53764, CVE-2024-53765, CVE-2024-53766, CVE-2024-53767, CVE-2024-53768, CVE-2024-53769, CVE-2024-53770, CVE-2024-53771, CVE-2024-53772, CVE-2024-53773, CVE-2024-53774, CVE-2024-53775, CVE-2024-53776, CVE-2024-53777, CVE-2024-53778, CVE-2024-53779, CVE-2024-53780, CVE-2024-53781, CVE-2024-53782, CVE-2024-53783, CVE-2024-53784, CVE-2024-53785, CVE-2024-53786, CVE-2024-53787, CVE-2024-53788, CVE-2024-53789, CVE-2024-53790, CVE-2024-53791, CVE-2024-53792, CVE-2024-53793, CVE-2024-53794, CVE-2024-53795, CVE-2024-53796, CVE-2024-53797, CVE-2024-53798, CVE-2024-53799, CVE-2024-53801, CVE-2024-53802, CVE-2024-53803, CVE-2024-53805, CVE-2024-53806, CVE-2024-53807, CVE-2024-53808, CVE-2024-53809, CVE-2024-53810, CVE-2024-53811, CVE-2024-53812, CVE-2024-53813, CVE-2024-53814, CVE-2024-53815, CVE-2024-53816, CVE-2024-53817, CVE-2024-53818, CVE-2024-53819, CVE-2024-53820, CVE-2024-53821, CVE-2024-53822, CVE-2024-53823, CVE-2024-53824, CVE-2024-53825, CVE-2024-53826, CVE-2024-54205, CVE-2024-54206, CVE-2024-54207, CVE-2024-54208, CVE-2024-54209, CVE-2024-54210, CVE-2024-54211, CVE-2024-54212, CVE-2024-54213, CVE-2024-54214, CVE-2024-54215, CVE-2024-54216, CVE-2024-54217, CVE-2024-54218, CVE-2024-54219, CVE-2024-54220, CVE-2024-54221, CVE-2024-54223, CVE-2024-54224, CVE-2024-54225, CVE-2024-54226, CVE-2024-54227, CVE-2024-54228, CVE-2024-54229, CVE-2024-54230, CVE-2024-54231, CVE-2024-54232, CVE-2024-54233, CVE-2024-54234, CVE-2024-54235, CVE-2024-54236, CVE-2024-54237, CVE-2024-54238, CVE-2024-54239, CVE-2024-54240, CVE-2024-54241, CVE-2024-54242, CVE-2024-54243, CVE-2024-54244, CVE-2024-54245, CVE-2024-54246, CVE-2024-54247, CVE-2024-54248, CVE-2024-54249, CVE-2024-54250, CVE-2024-54251, CVE-2024-54252, CVE-2024-54253, CVE-2024-54254, CVE-2024-54255, CVE-2024-54256, CVE-2024-54257, CVE-2024-54258, CVE-2024-54259, CVE-2024-54260, CVE-2024-54261, CVE-2024-54262, CVE-2024-54264, CVE-2024-54265, CVE-2024-54266, CVE-2024-54267, CVE-2024-54268, CVE-2024-54269, CVE-2024-54270, CVE-2024-54271, CVE-2024-54272, CVE-2024-54273, CVE-2024-54274, CVE-2024-54275, CVE-2024-54276, CVE-2024-54277, CVE-2024-54278, CVE-2024-54280, CVE-2024-54282, CVE-2024-54283, CVE-2024-54284, CVE-2024-54285, CVE-2024-54286, CVE-2024-54287, CVE-2024-54288, CVE-2024-54289, CVE-2024-54290, CVE-2024-54291, CVE-2024-54292, CVE-2024-54293, CVE-2024-54294, CVE-2024-54295, CVE-2024-54296, CVE-2024-54297, CVE-2024-54298, CVE-2024-54299, CVE-2024-54300, CVE-2024-54301, CVE-2024-54302, CVE-2024-54303, CVE-2024-54304, CVE-2024-54305, CVE-2024-54306, CVE-2024-54307, CVE-2024-54308, CVE-2024-54309, CVE-2024-54310, CVE-2024-54311, CVE-2024-54312, CVE-2024-54313, CVE-2024-54314, CVE-2024-54315, CVE-2024-54316, CVE-2024-54317, CVE-2024-54318, CVE-2024-54319, CVE-2024-54320, CVE-2024-54321, CVE-2024-54322, CVE-2024-54323, CVE-2024-54324, CVE-2024-54325, CVE-2024-54326, CVE-2024-54327, CVE-2024-54328, CVE-2024-54329, CVE-2024-54330, CVE-2024-54331, CVE-2024-54332, CVE-2024-54333, CVE-2024-54334, CVE-2024-54335, CVE-2024-54336, CVE-2024-54337, CVE-2024-54338, CVE-2024-54339, CVE-2024-54340, CVE-2024-54341, CVE-2024-54342, CVE-2024-54343, CVE-2024-54344, CVE-2024-54345, CVE-2024-54346, CVE-2024-54347, CVE-2024-54348, CVE-2024-54349, CVE-2024-54350, CVE-2024-54351, CVE-2024-54352, CVE-2024-54353, CVE-2024-54354, CVE-2024-54355, CVE-2024-54356, CVE-2024-54357, CVE-2024-54358, CVE-2024-54359, CVE-2024-54360, CVE-2024-54361, CVE-2024-54362, CVE-2024-54363, CVE-2024-54364, CVE-2024-54365, CVE-2024-54366, CVE-2024-54367, CVE-2024-54368, CVE-2024-54369, CVE-2024-54370, CVE-2024-54372, CVE-2024-54373, CVE-2024-54374, CVE-2024-54375, CVE-2024-54376, CVE-2024-54378, CVE-2024-54379, CVE-2024-54380, CVE-2024-54381, CVE-2024-54382, CVE-2024-54383, CVE-2024-54384, CVE-2024-54385, CVE-2024-54386, CVE-2024-54387, CVE-2024-54388, CVE-2024-54389, CVE-2024-54390, CVE-2024-54391, CVE-2024-54392, CVE-2024-54393, CVE-2024-54394, CVE-2024-54395, CVE-2024-54396, CVE-2024-54397, CVE-2024-54398, CVE-2024-54399, CVE-2024-54400, CVE-2024-54401, CVE-2024-54402, CVE-2024-54403, CVE-2024-54404, CVE-2024-54405, CVE-2024-54406, CVE-2024-54407, CVE-2024-54408, CVE-2024-54409, CVE-2024-54410, CVE-2024-54411, CVE-2024-54412, CVE-2024-54413, CVE-2024-54414, CVE-2024-54415, CVE-2024-54416, CVE-2024-54417, CVE-2024-54418, CVE-2024-54419, CVE-2024-54420, CVE-2024-54421, CVE-2024-54422, CVE-2024-54423, CVE-2024-54424, CVE-2024-54425, CVE-2024-54426, CVE-2024-54427, CVE-2024-54428, CVE-2024-54429, CVE-2024-54430, CVE-2024-54431, CVE-2024-54432, CVE-2024-54433, CVE-2024-54434, CVE-2024-54435, CVE-2024-54436, CVE-2024-54437, CVE-2024-54438, CVE-2024-54439, CVE-2024-54440, CVE-2024-54441, CVE-2024-54442, CVE-2024-54443, CVE-2024-54444, CVE-2024-55972, CVE-2024-55973, CVE-2024-55974, CVE-2024-55975, CVE-2024-55976, CVE-2024-55977, CVE-2024-55978, CVE-2024-55979, CVE-2024-55980, CVE-2024-55981, CVE-2024-55982, CVE-2024-55983, CVE-2024-55984, CVE-2024-55985, CVE-2024-55986, CVE-2024-55987, CVE-2024-55988, CVE-2024-55989, CVE-2024-55990, CVE-2024-55991, CVE-2024-55992, CVE-2024-55993, CVE-2024-55994, CVE-2024-55995, CVE-2024-55996, CVE-2024-55997, CVE-2024-55998, CVE-2024-55999, CVE-2024-56001, CVE-2024-56002, CVE-2024-56003, CVE-2024-56004, CVE-2024-56005, CVE-2024-56006, CVE-2024-56007, CVE-2024-56008, CVE-2024-56009, CVE-2024-56010, CVE-2024-56011, CVE-2024-56012, CVE-2024-56013, CVE-2024-56014, CVE-2024-56015, CVE-2024-56016, CVE-2024-56017, CVE-2024-56018, CVE-2024-56019, CVE-2024-56020, CVE-2024-56021, CVE-2024-56022, CVE-2024-56023, CVE-2024-56024, CVE-2024-56025, CVE-2024-56026, CVE-2024-56027, CVE-2024-56028, CVE-2024-56029, CVE-2024-56030, CVE-2024-56031, CVE-2024-56032, CVE-2024-56033, CVE-2024-56034, CVE-2024-56035, CVE-2024-56036, CVE-2024-56037, CVE-2024-56038, CVE-2024-56039, CVE-2024-56040, CVE-2024-56041, CVE-2024-56042, CVE-2024-56043, CVE-2024-56044, CVE-2024-56045, CVE-2024-56046, CVE-2024-56047, CVE-2024-56048, CVE-2024-56049, CVE-2024-56050, CVE-2024-56051, CVE-2024-56052, CVE-2024-56053, CVE-2024-56054, CVE-2024-56055, CVE-2024-56057, CVE-2024-56058, CVE-2024-56059, CVE-2024-56060, CVE-2024-56061, CVE-2024-56062, CVE-2024-56063, CVE-2024-56064, CVE-2024-56065, CVE-2024-56066, CVE-2024-56068, CVE-2024-56069, CVE-2024-56070, CVE-2024-56071, CVE-2024-56203, CVE-2024-56204, CVE-2024-56205, CVE-2024-56206, CVE-2024-56207, CVE-2024-56209, CVE-2024-56210, CVE-2024-56211, CVE-2024-56212, CVE-2024-56213, CVE-2024-56214, CVE-2024-56215, CVE-2024-56216, CVE-2024-56217, CVE-2024-56218, CVE-2024-56219, CVE-2024-56220, CVE-2024-56221, CVE-2024-56222, CVE-2024-56223, CVE-2024-56224, CVE-2024-56225, CVE-2024-56226, CVE-2024-56227, CVE-2024-56228, CVE-2024-56229, CVE-2024-56230, CVE-2024-56231, CVE-2024-56232, CVE-2024-56233, CVE-2024-56234, CVE-2024-56235, CVE-2024-56236, CVE-2024-56237, CVE-2024-56238, CVE-2024-56239, CVE-2024-56240, CVE-2024-56241, CVE-2024-56242, CVE-2024-56243, CVE-2024-56244, CVE-2024-56245, CVE-2024-56246, CVE-2024-56247, CVE-2024-56248, CVE-2024-56249, CVE-2024-56250, CVE-2024-56251, CVE-2024-56252, CVE-2024-56253, CVE-2024-56254, CVE-2024-56255, CVE-2024-56256, CVE-2024-56257, CVE-2024-56258, CVE-2024-56259, CVE-2024-56260, CVE-2024-56261, CVE-2024-56262, CVE-2024-56263, CVE-2024-56264, CVE-2024-56265, CVE-2024-56266, CVE-2024-56267, CVE-2024-56268, CVE-2024-56270, CVE-2024-56271, CVE-2024-56272, CVE-2024-56273, CVE-2024-56274, CVE-2024-56275, CVE-2024-56276, CVE-2024-56278, CVE-2024-56279, CVE-2024-56280, CVE-2024-56281, CVE-2024-56282, CVE-2024-56283, CVE-2024-56284, CVE-2024-56285, CVE-2024-56286, CVE-2024-56287, CVE-2024-56288, CVE-2024-56289, CVE-2024-56290, CVE-2024-56291, CVE-2024-56292, CVE-2024-56293, CVE-2024-56294, CVE-2024-56295, CVE-2024-56296, CVE-2024-56297, CVE-2024-56298, CVE-2024-56299, CVE-2024-56300, CVE-2024-56301, CVE-2024-56302, CVE-2024-58344, CVE-2024-7399, CVE-2024-7590, CVE-2024-9146, CVE-2025-10019, CVE-2025-10549, CVE-2025-12549, CVE-2025-12550, CVE-2025-12551, CVE-2025-13504, CVE-2025-13763, CVE-2025-13835, CVE-2025-14314, CVE-2025-14358, CVE-2025-14359, CVE-2025-14360, CVE-2025-14429, CVE-2025-14430, CVE-2025-14431, CVE-2025-15635, CVE-2025-15636, CVE-2025-1249, CVE-2025-22260, CVE-2025-22261, CVE-2025-22262, CVE-2025-22263, CVE-2025-22264, CVE-2025-22265, CVE-2025-22267, CVE-2025-22268, CVE-2025-22269, CVE-2025-22276, CVE-2025-22277, CVE-2025-22278, CVE-2025-22279, CVE-2025-22280, CVE-2025-22281, CVE-2025-22282, CVE-2025-22283, CVE-2025-22284, CVE-2025-22286, CVE-2025-22289, CVE-2025-22290, CVE-2025-22291, CVE-2025-22292, CVE-2025-22293, CVE-2025-22294, CVE-2025-22296, CVE-2025-22297, CVE-2025-22298, CVE-2025-22299, CVE-2025-22300, CVE-2025-22301, CVE-2025-22302, CVE-2025-22303, CVE-2025-22304, CVE-2025-22305, CVE-2025-22306, CVE-2025-22307, CVE-2025-22308, CVE-2025-22309, CVE-2025-22310, CVE-2025-22311, CVE-2025-22312, CVE-2025-22313, CVE-2025-22314, CVE-2025-22315, CVE-2025-22316, CVE-2025-22317, CVE-2025-22318, CVE-2025-22319, CVE-2025-22320, CVE-2025-22321, CVE-2025-22322, CVE-2025-22323, CVE-2025-22324, CVE-2025-22325, CVE-2025-22326, CVE-2025-22327, CVE-2025-22328, CVE-2025-22329, CVE-2025-22330, CVE-2025-22331, CVE-2025-22332, CVE-2025-22333, CVE-2025-22334, CVE-2025-22335, CVE-2025-22336, CVE-2025-22337, CVE-2025-22338, CVE-2025-22339, CVE-2025-22340, CVE-2025-22341, CVE-2025-22342, CVE-2025-22343, CVE-2025-22344, CVE-2025-22345, CVE-2025-22346, CVE-2025-22347, CVE-2025-22348, CVE-2025-22349, CVE-2025-22350, CVE-2025-22351, CVE-2025-22352, CVE-2025-22354, CVE-2025-22355, CVE-2025-22356, CVE-2025-22357, CVE-2025-22358, CVE-2025-22359, CVE-2025-22360, CVE-2025-22361, CVE-2025-22362, CVE-2025-22363, CVE-2025-22364, CVE-2025-22365, CVE-2025-22496, CVE-2025-22497, CVE-2025-22498, CVE-2025-22499, CVE-2025-22500, CVE-2025-22501, CVE-2025-22502, CVE-2025-22503, CVE-2025-22504, CVE-2025-22505, CVE-2025-22506, CVE-2025-22507, CVE-2025-22508, CVE-2025-22509, CVE-2025-22510, CVE-2025-22511, CVE-2025-22512, CVE-2025-22513, CVE-2025-22514, CVE-2025-22515, CVE-2025-22516, CVE-2025-22517, CVE-2025-22518, CVE-2025-22519, CVE-2025-22520, CVE-2025-22521, CVE-2025-22522, CVE-2025-22523, CVE-2025-22524, CVE-2025-22525, CVE-2025-22526, CVE-2025-22528, CVE-2025-22529, CVE-2025-22530, CVE-2025-22532, CVE-2025-22533, CVE-2025-22534, CVE-2025-22535, CVE-2025-22536, CVE-2025-22537, CVE-2025-22538, CVE-2025-22539, CVE-2025-22540, CVE-2025-22541, CVE-2025-22542, CVE-2025-22543, CVE-2025-22544, CVE-2025-22545, CVE-2025-22546, CVE-2025-22547, CVE-2025-22548, CVE-2025-22549, CVE-2025-22550, CVE-2025-22551, CVE-2025-22552, CVE-2025-22553, CVE-2025-22554, CVE-2025-22555, CVE-2025-22556, CVE-2025-22557, CVE-2025-22558, CVE-2025-22559, CVE-2025-22560, CVE-2025-22561, CVE-2025-22562, CVE-2025-22563, CVE-2025-22564, CVE-2025-22565, CVE-2025-22566, CVE-2025-22567, CVE-2025-22568, CVE-2025-22569, CVE-2025-22570, CVE-2025-22571, CVE-2025-22572, CVE-2025-22573, CVE-2025-22574, CVE-2025-22575, CVE-2025-22576, CVE-2025-22577, CVE-2025-22578, CVE-2025-22579, CVE-2025-22580, CVE-2025-22581, CVE-2025-22582, CVE-2025-22583, CVE-2025-22584, CVE-2025-22585, CVE-2025-22586, CVE-2025-22587, CVE-2025-22588, CVE-2025-22589, CVE-2025-22590, CVE-2025-22591, CVE-2025-22592, CVE-2025-22593, CVE-2025-22594, CVE-2025-22595, CVE-2025-22628, CVE-2025-22629, CVE-2025-22630, CVE-2025-22631, CVE-2025-22632, CVE-2025-22634, CVE-2025-22635, CVE-2025-22636, CVE-2025-22637, CVE-2025-22638, CVE-2025-22639, CVE-2025-22640, CVE-2025-22641, CVE-2025-22642, CVE-2025-22643, CVE-2025-22644, CVE-2025-22646, CVE-2025-22647, CVE-2025-22648, CVE-2025-22649, CVE-2025-22651, CVE-2025-22652, CVE-2025-22653, CVE-2025-22654, CVE-2025-22655, CVE-2025-22656, CVE-2025-22657, CVE-2025-22658, CVE-2025-22659, CVE-2025-22660, CVE-2025-22661, CVE-2025-22662, CVE-2025-22663, CVE-2025-22664, CVE-2025-22665, CVE-2025-22667, CVE-2025-22668, CVE-2025-22669, CVE-2025-22670, CVE-2025-22671, CVE-2025-22672, CVE-2025-22673, CVE-2025-22674, CVE-2025-22675, CVE-2025-22676, CVE-2025-22677, CVE-2025-22678, CVE-2025-22679, CVE-2025-22680, CVE-2025-22681, CVE-2025-22682, CVE-2025-22683, CVE-2025-22684, CVE-2025-22685, CVE-2025-22686, CVE-2025-22687, CVE-2025-22688, CVE-2025-22689, CVE-2025-22690, CVE-2025-22691, CVE-2025-22692, CVE-2025-22693, CVE-2025-22694, CVE-2025-22695, CVE-2025-22696, CVE-2025-22697, CVE-2025-22699, CVE-2025-22700, CVE-2025-22701, CVE-2025-22702, CVE-2025-22703, CVE-2025-22704, CVE-2025-22705, CVE-2025-22706, CVE-2025-22707, CVE-2025-22708, CVE-2025-22709, CVE-2025-22710, CVE-2025-22712, CVE-2025-22713, CVE-2025-22714, CVE-2025-22715, CVE-2025-22716, CVE-2025-22717, CVE-2025-22718, CVE-2025-22719, CVE-2025-22720, CVE-2025-22721, CVE-2025-22722, CVE-2025-22723, CVE-2025-22725, CVE-2025-22726, CVE-2025-22727, CVE-2025-22728, CVE-2025-22729, CVE-2025-22730, CVE-2025-22731, CVE-2025-22732, CVE-2025-22733, CVE-2025-22734, CVE-2025-22735, CVE-2025-22736, CVE-2025-22737, CVE-2025-22738, CVE-2025-22739, CVE-2025-22740, CVE-2025-22742, CVE-2025-22743, CVE-2025-22744, CVE-2025-22745, CVE-2025-22746, CVE-2025-22747, CVE-2025-22748, CVE-2025-22749, CVE-2025-22750, CVE-2025-22751, CVE-2025-22752, CVE-2025-22753, CVE-2025-22755, CVE-2025-22757, CVE-2025-22758, CVE-2025-22759, CVE-2025-22760, CVE-2025-22761, CVE-2025-22762, CVE-2025-22763, CVE-2025-22764, CVE-2025-22765, CVE-2025-22766, CVE-2025-22767, CVE-2025-22768, CVE-2025-22770, CVE-2025-22771, CVE-2025-22772, CVE-2025-22774, CVE-2025-22775, CVE-2025-22776, CVE-2025-22777, CVE-2025-22778, CVE-2025-22779, CVE-2025-22780, CVE-2025-22781, CVE-2025-22782, CVE-2025-22783, CVE-2025-22784, CVE-2025-22785, CVE-2025-22786, CVE-2025-22787, CVE-2025-22788, CVE-2025-22789, CVE-2025-22790, CVE-2025-22791, CVE-2025-22792, CVE-2025-22794, CVE-2025-22795, CVE-2025-22796, CVE-2025-22797, CVE-2025-22798, CVE-2025-22799, CVE-2025-22800, CVE-2025-22801, CVE-2025-22802, CVE-2025-22803, CVE-2025-22804, CVE-2025-22805, CVE-2025-22806, CVE-2025-22807, CVE-2025-22808, CVE-2025-22809, CVE-2025-22810, CVE-2025-22811, CVE-2025-22812, CVE-2025-22813, CVE-2025-22814, CVE-2025-22815, CVE-2025-22816, CVE-2025-22817, CVE-2025-22818, CVE-2025-22819, CVE-2025-22820, CVE-2025-22821, CVE-2025-22822, CVE-2025-22823, CVE-2025-22824, CVE-2025-22825, CVE-2025-22826, CVE-2025-22827, CVE-2025-23422, CVE-2025-23423, CVE-2025-23424, CVE-2025-23425, CVE-2025-23426, CVE-2025-23427, CVE-2025-23428, CVE-2025-23430, CVE-2025-23431, CVE-2025-23433, CVE-2025-23435, CVE-2025-23436, CVE-2025-23437, CVE-2025-23438, CVE-2025-23439, CVE-2025-23440, CVE-2025-23441, CVE-2025-23442, CVE-2025-23443, CVE-2025-23445, CVE-2025-23446, CVE-2025-23447, CVE-2025-23448, CVE-2025-23449, CVE-2025-23450, CVE-2025-23451, CVE-2025-23452, CVE-2025-23453, CVE-2025-23454, CVE-2025-23455, CVE-2025-23456, CVE-2025-23457, CVE-2025-23458, CVE-2025-23459, CVE-2025-23460, CVE-2025-23461, CVE-2025-23462, CVE-2025-23463, CVE-2025-23464, CVE-2025-23465, CVE-2025-23466, CVE-2025-23467, CVE-2025-23468, CVE-2025-23469, CVE-2025-23470, CVE-2025-23471, CVE-2025-23472, CVE-2025-23473, CVE-2025-23474, CVE-2025-23475, CVE-2025-23476, CVE-2025-23477, CVE-2025-23478, CVE-2025-23479, CVE-2025-23480, CVE-2025-23481, CVE-2025-23482, CVE-2025-23483, CVE-2025-23484, CVE-2025-23485, CVE-2025-23486, CVE-2025-23487, CVE-2025-23488, CVE-2025-23489, CVE-2025-23490, CVE-2025-23491, CVE-2025-23492, CVE-2025-23493, CVE-2025-23494, CVE-2025-23495, CVE-2025-23496, CVE-2025-23497, CVE-2025-23498, CVE-2025-23499, CVE-2025-23500, CVE-2025-23501, CVE-2025-23502, CVE-2025-23503, CVE-2025-23505, CVE-2025-23506, CVE-2025-23507, CVE-2025-23508, CVE-2025-23509, CVE-2025-23510, CVE-2025-23511, CVE-2025-23512, CVE-2025-23513, CVE-2025-23514, CVE-2025-23515, CVE-2025-23516, CVE-2025-23517, CVE-2025-23518, CVE-2025-23519, CVE-2025-23520, CVE-2025-23521, CVE-2025-23522, CVE-2025-23523, CVE-2025-23524, CVE-2025-23525, CVE-2025-23526, CVE-2025-23527, CVE-2025-23529, CVE-2025-23530, CVE-2025-23531, CVE-2025-23532, CVE-2025-23533, CVE-2025-23534, CVE-2025-23535, CVE-2025-23536, CVE-2025-23537, CVE-2025-23538, CVE-2025-23539, CVE-2025-23540, CVE-2025-23541, CVE-2025-23542, CVE-2025-23543, CVE-2025-23544, CVE-2025-23545, CVE-2025-23546, CVE-2025-23547, CVE-2025-23548, CVE-2025-23549, CVE-2025-23550, CVE-2025-23551, CVE-2025-23552, CVE-2025-23553, CVE-2025-23554, CVE-2025-23555, CVE-2025-23556, CVE-2025-23557, CVE-2025-23558, CVE-2025-23559, CVE-2025-23560, CVE-2025-23561, CVE-2025-23562, CVE-2025-23563, CVE-2025-23564, CVE-2025-23565, CVE-2025-23566, CVE-2025-23567, CVE-2025-23568, CVE-2025-23569, CVE-2025-23570, CVE-2025-23571, CVE-2025-23572, CVE-2025-23573, CVE-2025-23574, CVE-2025-23575, CVE-2025-23576, CVE-2025-23577, CVE-2025-23578, CVE-2025-23579, CVE-2025-23580, CVE-2025-23581, CVE-2025-23582, CVE-2025-23583, CVE-2025-23584, CVE-2025-23585, CVE-2025-23586, CVE-2025-23587, CVE-2025-23588, CVE-2025-23589, CVE-2025-23590, CVE-2025-23591, CVE-2025-23592, CVE-2025-23593, CVE-2025-23594, CVE-2025-23595, CVE-2025-23596, CVE-2025-23597, CVE-2025-23598, CVE-2025-23599, CVE-2025-23600, CVE-2025-23601, CVE-2025-23602, CVE-2025-23603, CVE-2025-23604, CVE-2025-23605, CVE-2025-23606, CVE-2025-23607, CVE-2025-23608, CVE-2025-23609, CVE-2025-23610, CVE-2025-23611, CVE-2025-23612, CVE-2025-23613, CVE-2025-23614, CVE-2025-23615, CVE-2025-23616, CVE-2025-23617, CVE-2025-23618, CVE-2025-23619, CVE-2025-23620, CVE-2025-23621, CVE-2025-23622, CVE-2025-23623, CVE-2025-23624, CVE-2025-23625, CVE-2025-23626, CVE-2025-23627, CVE-2025-23628, CVE-2025-23629, CVE-2025-23630, CVE-2025-23631, CVE-2025-23632, CVE-2025-23633, CVE-2025-23634, CVE-2025-23635, CVE-2025-23636, CVE-2025-23637, CVE-2025-23638, CVE-2025-23639, CVE-2025-23640, CVE-2025-23641, CVE-2025-23642, CVE-2025-23643, CVE-2025-23644, CVE-2025-23645, CVE-2025-23646, CVE-2025-23647, CVE-2025-23648, CVE-2025-23649, CVE-2025-23650, CVE-2025-23651, CVE-2025-23652, CVE-2025-23653, CVE-2025-23654, CVE-2025-23655, CVE-2025-23656, CVE-2025-23657, CVE-2025-23658, CVE-2025-23659, CVE-2025-23660, CVE-2025-23661, CVE-2025-23662, CVE-2025-23663, CVE-2025-23664, CVE-2025-23665, CVE-2025-23666, CVE-2025-23667, CVE-2025-23668, CVE-2025-23669, CVE-2025-23670, CVE-2025-23671, CVE-2025-23672, CVE-2025-23673, CVE-2025-23674, CVE-2025-23675, CVE-2025-23676, CVE-2025-23677, CVE-2025-23678, CVE-2025-23679, CVE-2025-23680, CVE-2025-23681, CVE-2025-23682, CVE-2025-23683, CVE-2025-23684, CVE-2025-23685, CVE-2025-23686, CVE-2025-23687, CVE-2025-23688, CVE-2025-23689, CVE-2025-23690, CVE-2025-23691, CVE-2025-23692, CVE-2025-23693, CVE-2025-23694, CVE-2025-23695, CVE-2025-23696, CVE-2025-23697, CVE-2025-23698, CVE-2025-23699, CVE-2025-23700, CVE-2025-23701, CVE-2025-23702, CVE-2025-23703, CVE-2025-23704, CVE-2025-23705, CVE-2025-23706, CVE-2025-23707, CVE-2025-23708, CVE-2025-23709, CVE-2025-23710, CVE-2025-23711, CVE-2025-23712, CVE-2025-23713, CVE-2025-23714, CVE-2025-23715, CVE-2025-23716, CVE-2025-23717, CVE-2025-23718, CVE-2025-23719, CVE-2025-23720, CVE-2025-23721, CVE-2025-23722, CVE-2025-23723, CVE-2025-23724, CVE-2025-23725, CVE-2025-23726, CVE-2025-23727, CVE-2025-23728, CVE-2025-23729, CVE-2025-23730, CVE-2025-23731, CVE-2025-23732, CVE-2025-23733, CVE-2025-23734, CVE-2025-23735, CVE-2025-23736, CVE-2025-23737, CVE-2025-23738, CVE-2025-23739, CVE-2025-23740, CVE-2025-23741, CVE-2025-23742, CVE-2025-23743, CVE-2025-23744, CVE-2025-23745, CVE-2025-23746, CVE-2025-23747, CVE-2025-23748, CVE-2025-23749, CVE-2025-23750, CVE-2025-23751, CVE-2025-23752, CVE-2025-23753, CVE-2025-23754, CVE-2025-23755, CVE-2025-23756, CVE-2025-23757, CVE-2025-23758, CVE-2025-23759, CVE-2025-23760, CVE-2025-23761, CVE-2025-23762, CVE-2025-23763, CVE-2025-23764, CVE-2025-23765, CVE-2025-23766, CVE-2025-23767, CVE-2025-23768, CVE-2025-23769, CVE-2025-23770, CVE-2025-23771, CVE-2025-23772, CVE-2025-23773, CVE-2025-23774, CVE-2025-23775, CVE-2025-23776, CVE-2025-23777, CVE-2025-23778, CVE-2025-23779, CVE-2025-23780, CVE-2025-23781, CVE-2025-23782, CVE-2025-23783, CVE-2025-23785, CVE-2025-23786, CVE-2025-23787, CVE-2025-23788, CVE-2025-23789, CVE-2025-23790, CVE-2025-23791, CVE-2025-23792, CVE-2025-23793, CVE-2025-23794, CVE-2025-23795, CVE-2025-23796, CVE-2025-23797, CVE-2025-23798, CVE-2025-23799, CVE-2025-23800, CVE-2025-23801, CVE-2025-23802, CVE-2025-23803, CVE-2025-23804, CVE-2025-23805, CVE-2025-23807, CVE-2025-23808, CVE-2025-23809, CVE-2025-23810, CVE-2025-23811, CVE-2025-23812, CVE-2025-23813, CVE-2025-23814, CVE-2025-23815, CVE-2025-23816, CVE-2025-23817, CVE-2025-23818, CVE-2025-23819, CVE-2025-23820, CVE-2025-23821, CVE-2025-23822, CVE-2025-23823, CVE-2025-23824, CVE-2025-23825, CVE-2025-23826, CVE-2025-23827, CVE-2025-23828, CVE-2025-23829, CVE-2025-23830, CVE-2025-23831, CVE-2025-23832, CVE-2025-23833, CVE-2025-23834, CVE-2025-23835, CVE-2025-23836, CVE-2025-23837, CVE-2025-23838, CVE-2025-23839, CVE-2025-23840, CVE-2025-23841, CVE-2025-23842, CVE-2025-23843, CVE-2025-23844, CVE-2025-23845, CVE-2025-23846, CVE-2025-23847, CVE-2025-23848, CVE-2025-23849, CVE-2025-23850, CVE-2025-23851, CVE-2025-23852, CVE-2025-23853, CVE-2025-23854, CVE-2025-23855, CVE-2025-23856, CVE-2025-23857, CVE-2025-23858, CVE-2025-23859, CVE-2025-23860, CVE-2025-23861, CVE-2025-23862, CVE-2025-23863, CVE-2025-23864, CVE-2025-23865, CVE-2025-23866, CVE-2025-23867, CVE-2025-23868, CVE-2025-23869, CVE-2025-23870, CVE-2025-23871, CVE-2025-23872, CVE-2025-23873, CVE-2025-23874, CVE-2025-23875, CVE-2025-23876, CVE-2025-23877, CVE-2025-23878, CVE-2025-23879, CVE-2025-23880, CVE-2025-23881, CVE-2025-23882, CVE-2025-23883, CVE-2025-23884, CVE-2025-23885, CVE-2025-23886, CVE-2025-23887, CVE-2025-23888, CVE-2025-23889, CVE-2025-23890, CVE-2025-23891, CVE-2025-23892, CVE-2025-23893, CVE-2025-23894, CVE-2025-23895, CVE-2025-23896, CVE-2025-23897, CVE-2025-23898, CVE-2025-23899, CVE-2025-23900, CVE-2025-23901, CVE-2025-23902, CVE-2025-23903, CVE-2025-23904, CVE-2025-23905, CVE-2025-23906, CVE-2025-23907, CVE-2025-23908, CVE-2025-23909, CVE-2025-23910, CVE-2025-23911, CVE-2025-23912, CVE-2025-23913, CVE-2025-23914, CVE-2025-23915, CVE-2025-23916, CVE-2025-23917, CVE-2025-23918, CVE-2025-23919, CVE-2025-23920, CVE-2025-23921, CVE-2025-23922, CVE-2025-23923, CVE-2025-23924, CVE-2025-23925, CVE-2025-23926, CVE-2025-23927, CVE-2025-23928, CVE-2025-23929, CVE-2025-23930, CVE-2025-23931, CVE-2025-23932, CVE-2025-23933, CVE-2025-23934, CVE-2025-23935, CVE-2025-23936, CVE-2025-23937, CVE-2025-23938, CVE-2025-23939, CVE-2025-23940, CVE-2025-23941, CVE-2025-23942, CVE-2025-23943, CVE-2025-23944, CVE-2025-23945, CVE-2025-23946, CVE-2025-23947, CVE-2025-23948, CVE-2025-23949, CVE-2025-23950, CVE-2025-23951, CVE-2025-23952, CVE-2025-23953, CVE-2025-23954, CVE-2025-23955, CVE-2025-23956, CVE-2025-23957, CVE-2025-23958, CVE-2025-23959, CVE-2025-23960, CVE-2025-23961, CVE-2025-23962, CVE-2025-23963, CVE-2025-23964, CVE-2025-23965, CVE-2025-23966, CVE-2025-23967, CVE-2025-23968, CVE-2025-23969, CVE-2025-23970, CVE-2025-23971, CVE-2025-23972, CVE-2025-23973, CVE-2025-23974, CVE-2025-23975, CVE-2025-23976, CVE-2025-23977, CVE-2025-23978, CVE-2025-23979, CVE-2025-23980, CVE-2025-23981, CVE-2025-23982, CVE-2025-23983, CVE-2025-23984, CVE-2025-23985, CVE-2025-23986, CVE-2025-23987, CVE-2025-23988, CVE-2025-23989, CVE-2025-23990, CVE-2025-23991, CVE-2025-23992, CVE-2025-23993, CVE-2025-23994, CVE-2025-23995, CVE-2025-23996, CVE-2025-23997, CVE-2025-23998, CVE-2025-23999, CVE-2025-24000, CVE-2025-24001, CVE-2025-24533, CVE-2025-24534, CVE-2025-24535, CVE-2025-24536, CVE-2025-24537, CVE-2025-24538, CVE-2025-24539, CVE-2025-24540, CVE-2025-24541, CVE-2025-24542, CVE-2025-24543, CVE-2025-24544, CVE-2025-24545, CVE-2025-24546, CVE-2025-24547, CVE-2025-24548, CVE-2025-24549, CVE-2025-24550, CVE-2025-24551, CVE-2025-24552, CVE-2025-24553, CVE-2025-24554, CVE-2025-24555, CVE-2025-24557, CVE-2025-24558, CVE-2025-24559, CVE-2025-24560, CVE-2025-24561, CVE-2025-24562, CVE-2025-24563, CVE-2025-24564, CVE-2025-24565, CVE-2025-24566, CVE-2025-24567, CVE-2025-24568, CVE-2025-24569, CVE-2025-24570, CVE-2025-24571, CVE-2025-24572, CVE-2025-24573, CVE-2025-24574, CVE-2025-24575, CVE-2025-24576, CVE-2025-24577, CVE-2025-24578, CVE-2025-24579, CVE-2025-24580, CVE-2025-24581, CVE-2025-24582, CVE-2025-24583, CVE-2025-24584, CVE-2025-24585, CVE-2025-24586, CVE-2025-24587, CVE-2025-24588, CVE-2025-24589, CVE-2025-24590, CVE-2025-24591, CVE-2025-24592, CVE-2025-24593, CVE-2025-24594, CVE-2025-24595, CVE-2025-24596, CVE-2025-24597, CVE-2025-24598, CVE-2025-24599, CVE-2025-24600, CVE-2025-24601, CVE-2025-24602, CVE-2025-24603, CVE-2025-24604, CVE-2025-24605, CVE-2025-24608, CVE-2025-24609, CVE-2025-24610, CVE-2025-24611, CVE-2025-24612, CVE-2025-24613, CVE-2025-24614, CVE-2025-24615, CVE-2025-24616, CVE-2025-24617, CVE-2025-24618, CVE-2025-24619, CVE-2025-24620, CVE-2025-24621, CVE-2025-24622, CVE-2025-24623, CVE-2025-24624, CVE-2025-24625, CVE-2025-24626, CVE-2025-24627, CVE-2025-24629, CVE-2025-24630, CVE-2025-24631, CVE-2025-24632, CVE-2025-24633, CVE-2025-24634, CVE-2025-24635, CVE-2025-24636, CVE-2025-24637, CVE-2025-24638, CVE-2025-24639, CVE-2025-24640, CVE-2025-24641, CVE-2025-24642, CVE-2025-24644, CVE-2025-24645, CVE-2025-24646, CVE-2025-24647, CVE-2025-24648, CVE-2025-24649, CVE-2025-24650, CVE-2025-24652, CVE-2025-24653, CVE-2025-24654, CVE-2025-24655, CVE-2025-24656, CVE-2025-24657, CVE-2025-24658, CVE-2025-24659, CVE-2025-24660, CVE-2025-24661, CVE-2025-24662, CVE-2025-24663, CVE-2025-24664, CVE-2025-24665, CVE-2025-24666, CVE-2025-24667, CVE-2025-24668, CVE-2025-24669, CVE-2025-24670, CVE-2025-24671, CVE-2025-24672, CVE-2025-24673, CVE-2025-24674, CVE-2025-24675, CVE-2025-24676, CVE-2025-24677, CVE-2025-24678, CVE-2025-24679, CVE-2025-24680, CVE-2025-24681, CVE-2025-24682, CVE-2025-24683, CVE-2025-24684, CVE-2025-24685, CVE-2025-24686, CVE-2025-24687, CVE-2025-24688, CVE-2025-24689, CVE-2025-24690, CVE-2025-24691, CVE-2025-24692, CVE-2025-24693, CVE-2025-24694, CVE-2025-24695, CVE-2025-24696, CVE-2025-24697, CVE-2025-24698, CVE-2025-24699, CVE-2025-24700, CVE-2025-24701, CVE-2025-24702, CVE-2025-24703, CVE-2025-24704, CVE-2025-24705, CVE-2025-24706, CVE-2025-24707, CVE-2025-24708, CVE-2025-24709, CVE-2025-24710, CVE-2025-24711, CVE-2025-24712, CVE-2025-24713, CVE-2025-24714, CVE-2025-24715, CVE-2025-24716, CVE-2025-24717, CVE-2025-24718, CVE-2025-24719, CVE-2025-24720, CVE-2025-24721, CVE-2025-24722, CVE-2025-24723, CVE-2025-24724, CVE-2025-24725, CVE-2025-24726, CVE-2025-24727, CVE-2025-24728, CVE-2025-24729, CVE-2025-24730, CVE-2025-24731, CVE-2025-24732, CVE-2025-24733, CVE-2025-24734, CVE-2025-24736, CVE-2025-24737, CVE-2025-24738, CVE-2025-24739, CVE-2025-24740, CVE-2025-24741, CVE-2025-24742, CVE-2025-24743, CVE-2025-24744, CVE-2025-24745, CVE-2025-24746, CVE-2025-24747, CVE-2025-24748, CVE-2025-24749, CVE-2025-24750, CVE-2025-24751, CVE-2025-24752, CVE-2025-24753, CVE-2025-24754, CVE-2025-24755, CVE-2025-24756, CVE-2025-24757, CVE-2025-24758, CVE-2025-24759, CVE-2025-24760, CVE-2025-24761, CVE-2025-24762, CVE-2025-24763, CVE-2025-24764, CVE-2025-24765, CVE-2025-24766, CVE-2025-24767, CVE-2025-24768, CVE-2025-24769, CVE-2025-24770, CVE-2025-24771, CVE-2025-24772, CVE-2025-24773, CVE-2025-24774, CVE-2025-24775, CVE-2025-24776, CVE-2025-24777, CVE-2025-24778, CVE-2025-24779, CVE-2025-24780, CVE-2025-24781, CVE-2025-24782, CVE-2025-25070, CVE-2025-25071, CVE-2025-25072, CVE-2025-25073, CVE-2025-25074, CVE-2025-25075, CVE-2025-25076, CVE-2025-25077, CVE-2025-25078, CVE-2025-25079, CVE-2025-25080, CVE-2025-25081, CVE-2025-25082, CVE-2025-25083, CVE-2025-25085, CVE-2025-25086, CVE-2025-25087, CVE-2025-25088, CVE-2025-25089, CVE-2025-25090, CVE-2025-25091, CVE-2025-25092, CVE-2025-25093, CVE-2025-25094, CVE-2025-25095, CVE-2025-25096, CVE-2025-25097, CVE-2025-25098, CVE-2025-25099, CVE-2025-25100, CVE-2025-25101, CVE-2025-25102, CVE-2025-25103, CVE-2025-25104, CVE-2025-25105, CVE-2025-25106, CVE-2025-25107, CVE-2025-25108, CVE-2025-25109, CVE-2025-25110, CVE-2025-25111, CVE-2025-25112, CVE-2025-25113, CVE-2025-25114, CVE-2025-25115, CVE-2025-25116, CVE-2025-25117, CVE-2025-25118, CVE-2025-25119, CVE-2025-25120, CVE-2025-25121, CVE-2025-25122, CVE-2025-25123, CVE-2025-25124, CVE-2025-25125, CVE-2025-25126, CVE-2025-25127, CVE-2025-25128, CVE-2025-25129, CVE-2025-25130, CVE-2025-25131, CVE-2025-25132, CVE-2025-25133, CVE-2025-25134, CVE-2025-25135, CVE-2025-25136, CVE-2025-25137, CVE-2025-25138, CVE-2025-25139, CVE-2025-25140, CVE-2025-25141, CVE-2025-25142, CVE-2025-25143, CVE-2025-25144, CVE-2025-25145, CVE-2025-25146, CVE-2025-25147, CVE-2025-25148, CVE-2025-25149, CVE-2025-25150, CVE-2025-25151, CVE-2025-25152, CVE-2025-25153, CVE-2025-25154, CVE-2025-25155, CVE-2025-25156, CVE-2025-25157, CVE-2025-25158, CVE-2025-25159, CVE-2025-25160, CVE-2025-25161, CVE-2025-25162, CVE-2025-25163, CVE-2025-25164, CVE-2025-25165, CVE-2025-25166, CVE-2025-25167, CVE-2025-25168, CVE-2025-25169, CVE-2025-25170, CVE-2025-25171, CVE-2025-25172, CVE-2025-25173, CVE-2025-25174, CVE-2025-26534, CVE-2025-26535, CVE-2025-26536, CVE-2025-26537, CVE-2025-26538, CVE-2025-26539, CVE-2025-26540, CVE-2025-26541, CVE-2025-26542, CVE-2025-26543, CVE-2025-26544, CVE-2025-26545, CVE-2025-26546, CVE-2025-26547, CVE-2025-26548, CVE-2025-26549, CVE-2025-26550, CVE-2025-26551, CVE-2025-26552, CVE-2025-26553, CVE-2025-26554, CVE-2025-26555, CVE-2025-26556, CVE-2025-26557, CVE-2025-26558, CVE-2025-26559, CVE-2025-26560, CVE-2025-26561, CVE-2025-26562, CVE-2025-26563, CVE-2025-26564, CVE-2025-26565, CVE-2025-26566, CVE-2025-26567, CVE-2025-26568, CVE-2025-26569, CVE-2025-26570, CVE-2025-26571, CVE-2025-26572, CVE-2025-26573, CVE-2025-26574, CVE-2025-26575, CVE-2025-26576, CVE-2025-26577, CVE-2025-26578, CVE-2025-26579, CVE-2025-26580, CVE-2025-26581, CVE-2025-26582, CVE-2025-26583, CVE-2025-26584, CVE-2025-26585, CVE-2025-26586, CVE-2025-26587, CVE-2025-26588, CVE-2025-26589, CVE-2025-26590, CVE-2025-26591, CVE-2025-26592, CVE-2025-26593, CVE-2025-26730, CVE-2025-26731, CVE-2025-26732, CVE-2025-26733, CVE-2025-26734, CVE-2025-26735, CVE-2025-26736, CVE-2025-26737, CVE-2025-26738, CVE-2025-26739, CVE-2025-26740, CVE-2025-26741, CVE-2025-26742, CVE-2025-26743, CVE-2025-26744, CVE-2025-26745, CVE-2025-26746, CVE-2025-26747, CVE-2025-26748, CVE-2025-26749, CVE-2025-26750, CVE-2025-26751, CVE-2025-26752, CVE-2025-26753, CVE-2025-26754, CVE-2025-26755, CVE-2025-26756, CVE-2025-26757, CVE-2025-26758, CVE-2025-26759, CVE-2025-26761, CVE-2025-26762, CVE-2025-26763, CVE-2025-26764, CVE-2025-26765, CVE-2025-26766, CVE-2025-26767, CVE-2025-26768, CVE-2025-26769, CVE-2025-26770, CVE-2025-26771, CVE-2025-26772, CVE-2025-26773, CVE-2025-26774, CVE-2025-26775, CVE-2025-26776, CVE-2025-26778, CVE-2025-26779, CVE-2025-26867, CVE-2025-26868, CVE-2025-26870, CVE-2025-26871, CVE-2025-26872, CVE-2025-26873, CVE-2025-26874, CVE-2025-26875, CVE-2025-26876, CVE-2025-26877, CVE-2025-26878, CVE-2025-26880, CVE-2025-26881, CVE-2025-26882, CVE-2025-26883, CVE-2025-26884, CVE-2025-26886, CVE-2025-26887, CVE-2025-26888, CVE-2025-26889, CVE-2025-26890, CVE-2025-26891, CVE-2025-26892, CVE-2025-26893, CVE-2025-26894, CVE-2025-26895, CVE-2025-26896, CVE-2025-26897, CVE-2025-26898, CVE-2025-26899, CVE-2025-26900, CVE-2025-26901, CVE-2025-26902, CVE-2025-26903, CVE-2025-26904, CVE-2025-26905, CVE-2025-26906, CVE-2025-26907, CVE-2025-26908, CVE-2025-26909, CVE-2025-26910, CVE-2025-26911, CVE-2025-26912, CVE-2025-26913, CVE-2025-26914, CVE-2025-26915, CVE-2025-26916, CVE-2025-26918, CVE-2025-26919, CVE-2025-26920, CVE-2025-26921, CVE-2025-26922, CVE-2025-26923, CVE-2025-26924, CVE-2025-26925, CVE-2025-26926, CVE-2025-26927, CVE-2025-26928, CVE-2025-26929, CVE-2025-26930, CVE-2025-26931, CVE-2025-26932, CVE-2025-26933, CVE-2025-26934, CVE-2025-26935, CVE-2025-26936, CVE-2025-26937, CVE-2025-26938, CVE-2025-26939, CVE-2025-26940, CVE-2025-26941, CVE-2025-26943, CVE-2025-26944, CVE-2025-26945, CVE-2025-26946, CVE-2025-26947, CVE-2025-26948, CVE-2025-26949, CVE-2025-26950, CVE-2025-26951, CVE-2025-26952, CVE-2025-26954, CVE-2025-26955, CVE-2025-26956, CVE-2025-26957, CVE-2025-26959, CVE-2025-26960, CVE-2025-26961, CVE-2025-26962, CVE-2025-26963, CVE-2025-26964, CVE-2025-26966, CVE-2025-26967, CVE-2025-26968, CVE-2025-26969, CVE-2025-26970, CVE-2025-26971, CVE-2025-26972, CVE-2025-26973, CVE-2025-26974, CVE-2025-26975, CVE-2025-26976, CVE-2025-26977, CVE-2025-26978, CVE-2025-26979, CVE-2025-26980, CVE-2025-26981, CVE-2025-26982, CVE-2025-26983, CVE-2025-26984, CVE-2025-26985, CVE-2025-26986, CVE-2025-26987, CVE-2025-26988, CVE-2025-26989, CVE-2025-26990, CVE-2025-26991, CVE-2025-26992, CVE-2025-26993, CVE-2025-26994, CVE-2025-26995, CVE-2025-26996, CVE-2025-26997, CVE-2025-26998, CVE-2025-26999, CVE-2025-27000, CVE-2025-27001, CVE-2025-27002, CVE-2025-27003, CVE-2025-27004, CVE-2025-27005, CVE-2025-27006, CVE-2025-27007, CVE-2025-27008, CVE-2025-27009, CVE-2025-27010, CVE-2025-27011, CVE-2025-27012, CVE-2025-27013, CVE-2025-27014, CVE-2025-27015, CVE-2025-27016, CVE-2025-27263, CVE-2025-27264, CVE-2025-27265, CVE-2025-27266, CVE-2025-27267, CVE-2025-27268, CVE-2025-27269, CVE-2025-27270, CVE-2025-27271, CVE-2025-27272, CVE-2025-27273, CVE-2025-27274, CVE-2025-27275, CVE-2025-27276, CVE-2025-27277, CVE-2025-27278, CVE-2025-27279, CVE-2025-27280, CVE-2025-27281, CVE-2025-27282, CVE-2025-27283, CVE-2025-27284, CVE-2025-27285, CVE-2025-27286, CVE-2025-27287, CVE-2025-27288, CVE-2025-27289, CVE-2025-27290, CVE-2025-27291, CVE-2025-27292, CVE-2025-27293, CVE-2025-27294, CVE-2025-27295, CVE-2025-27296, CVE-2025-27297, CVE-2025-27298, CVE-2025-27299, CVE-2025-27300, CVE-2025-27301, CVE-2025-27302, CVE-2025-27303, CVE-2025-27304, CVE-2025-27305, CVE-2025-27306, CVE-2025-27307, CVE-2025-27308, CVE-2025-27309, CVE-2025-27310, CVE-2025-27311, CVE-2025-27312, CVE-2025-27313, CVE-2025-27314, CVE-2025-27315, CVE-2025-27316, CVE-2025-27317, CVE-2025-27318, CVE-2025-27319, CVE-2025-27320, CVE-2025-27321, CVE-2025-27322, CVE-2025-27323, CVE-2025-27324, CVE-2025-27325, CVE-2025-27326, CVE-2025-27327, CVE-2025-27328, CVE-2025-27329, CVE-2025-27330, CVE-2025-27331, CVE-2025-27332, CVE-2025-27333, CVE-2025-27334, CVE-2025-27335, CVE-2025-27336, CVE-2025-27337, CVE-2025-27338, CVE-2025-27339, CVE-2025-27340, CVE-2025-27341, CVE-2025-27342, CVE-2025-27343, CVE-2025-27344, CVE-2025-27345, CVE-2025-27347, CVE-2025-27348, CVE-2025-27349, CVE-2025-27350, CVE-2025-27351, CVE-2025-27352, CVE-2025-27353, CVE-2025-27354, CVE-2025-27355, CVE-2025-27356, CVE-2025-27357, CVE-2025-27358, CVE-2025-27359, CVE-2025-27360, CVE-2025-27361, CVE-2025-27362, CVE-2025-28855, CVE-2025-28856, CVE-2025-28857, CVE-2025-28859, CVE-2025-28860, CVE-2025-28861, CVE-2025-28862, CVE-2025-28863, CVE-2025-28864, CVE-2025-28865, CVE-2025-28866, CVE-2025-28867, CVE-2025-28868, CVE-2025-28869, CVE-2025-28870, CVE-2025-28871, CVE-2025-28872, CVE-2025-28873, CVE-2025-28874, CVE-2025-28875, CVE-2025-28876, CVE-2025-28877, CVE-2025-28878, CVE-2025-28879, CVE-2025-28880, CVE-2025-28881, CVE-2025-28882, CVE-2025-28883, CVE-2025-28884, CVE-2025-28885, CVE-2025-28886, CVE-2025-28887, CVE-2025-28888, CVE-2025-28889, CVE-2025-28890, CVE-2025-28891, CVE-2025-28892, CVE-2025-28893, CVE-2025-28894, CVE-2025-28895, CVE-2025-28896, CVE-2025-28897, CVE-2025-28898, CVE-2025-28899, CVE-2025-28900, CVE-2025-28901, CVE-2025-28902, CVE-2025-28903, CVE-2025-28904, CVE-2025-28905, CVE-2025-28906, CVE-2025-28907, CVE-2025-28908, CVE-2025-28909, CVE-2025-28910, CVE-2025-28911, CVE-2025-28912, CVE-2025-28913, CVE-2025-28914, CVE-2025-28915, CVE-2025-28916, CVE-2025-28917, CVE-2025-28918, CVE-2025-28919, CVE-2025-28920, CVE-2025-28921, CVE-2025-28922, CVE-2025-28923, CVE-2025-28924, CVE-2025-28925, CVE-2025-28926, CVE-2025-28927, CVE-2025-28928, CVE-2025-28929, CVE-2025-28930, CVE-2025-28931, CVE-2025-28932,...
Date: Thu, 23 Apr 2026 14:56:21 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/cve-exclusion_6.12.inc | 230 +++++++++++++++++-
1 file changed, 219 insertions(+), 11 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index 2ae4f461e5..88a2da476c 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2026-04-14 21:08:51.681656+00:00 for kernel version 6.12.81
-# From linux_kernel_cves cve_2026-04-14_2000Z-1-g4a280a922d3
+# Generated at 2026-04-23 14:57:09.231573+00:00 for kernel version 6.12.83
+# From linux_kernel_cves cve_2026-04-23_1300Z-1-g8aa5543fc90
python check_kernel_cve_status_version() {
- this_version = "6.12.81"
+ this_version = "6.12.83"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -15308,7 +15308,7 @@ CVE_STATUS[CVE-2025-21707] = "cpe-stable-backport: Backported in 6.12.13"
CVE_STATUS[CVE-2025-21708] = "cpe-stable-backport: Backported in 6.12.13"
-# CVE-2025-21709 needs backporting (fixed from 6.14)
+CVE_STATUS[CVE-2025-21709] = "cpe-stable-backport: Backported in 6.12.83"
CVE_STATUS[CVE-2025-21710] = "cpe-stable-backport: Backported in 6.12.13"
@@ -18674,7 +18674,7 @@ CVE_STATUS[CVE-2025-39928] = "fixed-version: only affects 6.13 onwards"
CVE_STATUS[CVE-2025-39929] = "cpe-stable-backport: Backported in 6.12.49"
-CVE_STATUS[CVE-2025-39930] = "fixed-version: only affects 6.14 onwards"
+CVE_STATUS[CVE-2025-39930] = "cpe-stable-backport: Backported in 6.12.82"
CVE_STATUS[CVE-2025-39931] = "cpe-stable-backport: Backported in 6.12.49"
@@ -20448,7 +20448,7 @@ CVE_STATUS[CVE-2026-22984] = "cpe-stable-backport: Backported in 6.12.66"
CVE_STATUS[CVE-2026-22985] = "cpe-stable-backport: Backported in 6.12.80"
-# CVE-2026-22986 needs backporting (fixed from 6.19)
+CVE_STATUS[CVE-2026-22986] = "cpe-stable-backport: Backported in 6.12.83"
CVE_STATUS[CVE-2026-22987] = "fixed-version: only affects 6.17 onwards"
@@ -21080,7 +21080,7 @@ CVE_STATUS[CVE-2026-23300] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23301] = "fixed-version: only affects 6.19 onwards"
-# CVE-2026-23302 needs backporting (fixed from 7.0)
+CVE_STATUS[CVE-2026-23302] = "cpe-stable-backport: Backported in 6.12.82"
CVE_STATUS[CVE-2026-23303] = "cpe-stable-backport: Backported in 6.12.77"
@@ -21134,7 +21134,7 @@ CVE_STATUS[CVE-2026-23328] = "fixed-version: only affects 6.14 onwards"
CVE_STATUS[CVE-2026-23329] = "fixed-version: only affects 6.18 onwards"
-# CVE-2026-23330 needs backporting (fixed from 7.0)
+CVE_STATUS[CVE-2026-23330] = "cpe-stable-backport: Backported in 6.12.82"
CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards"
@@ -21220,7 +21220,7 @@ CVE_STATUS[CVE-2026-23372] = "cpe-stable-backport: Backported in 6.12.77"
CVE_STATUS[CVE-2026-23373] = "cpe-stable-backport: Backported in 6.12.77"
-# CVE-2026-23374 needs backporting (fixed from 7.0)
+CVE_STATUS[CVE-2026-23374] = "cpe-stable-backport: Backported in 6.12.82"
CVE_STATUS[CVE-2026-23375] = "cpe-stable-backport: Backported in 6.12.78"
@@ -21356,7 +21356,7 @@ CVE_STATUS[CVE-2026-23440] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-23441] = "cpe-stable-backport: Backported in 6.12.78"
-# CVE-2026-23442 needs backporting (fixed from 7.0)
+CVE_STATUS[CVE-2026-23442] = "cpe-stable-backport: Backported in 6.12.83"
CVE_STATUS[CVE-2026-23443] = "cpe-stable-backport: Backported in 6.12.78"
@@ -21458,7 +21458,7 @@ CVE_STATUS[CVE-2026-31405] = "cpe-stable-backport: Backported in 6.12.78"
CVE_STATUS[CVE-2026-31406] = "cpe-stable-backport: Backported in 6.12.80"
-# CVE-2026-31407 needs backporting (fixed from 7.0)
+CVE_STATUS[CVE-2026-31407] = "cpe-stable-backport: Backported in 6.12.83"
CVE_STATUS[CVE-2026-31408] = "cpe-stable-backport: Backported in 6.12.80"
@@ -21502,5 +21502,213 @@ CVE_STATUS[CVE-2026-31427] = "cpe-stable-backport: Backported in 6.12.80"
CVE_STATUS[CVE-2026-31428] = "cpe-stable-backport: Backported in 6.12.80"
+CVE_STATUS[CVE-2026-31429] = "cpe-stable-backport: Backported in 6.12.82"
+
+CVE_STATUS[CVE-2026-31430] = "cpe-stable-backport: Backported in 6.12.82"
+
+# CVE-2026-31431 needs backporting (fixed from 7.0)
+
+CVE_STATUS[CVE-2026-31432] = "cpe-stable-backport: Backported in 6.12.81"
+
+CVE_STATUS[CVE-2026-31433] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31434] = "cpe-stable-backport: Backported in 6.12.80"
+
+# CVE-2026-31435 needs backporting (fixed from 7.0)
+
+CVE_STATUS[CVE-2026-31436] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31437] = "fixed-version: only affects 6.18.17 onwards"
+
+CVE_STATUS[CVE-2026-31438] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31439] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31440] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31441] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31442] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-31443] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-31444] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31445] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-31446] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31447] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31448] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31449] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31450] = "cpe-stable-backport: Backported in 6.12.81"
+
+CVE_STATUS[CVE-2026-31451] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31452] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31453] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31454] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31455] = "cpe-stable-backport: Backported in 6.12.80"
+
+# CVE-2026-31456 needs backporting (fixed from 7.0)
+
+CVE_STATUS[CVE-2026-31457] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-31458] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31459] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-31460] = "fixed-version: only affects 6.19 onwards"
+
+# CVE-2026-31461 needs backporting (fixed from 7.0)
+
+CVE_STATUS[CVE-2026-31462] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31463] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-31464] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31465] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-31466] = "cpe-stable-backport: Backported in 6.12.81"
+
+CVE_STATUS[CVE-2026-31467] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31468] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-31469] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31470] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31471] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-31472] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-31473] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31474] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31475] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-31476] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31477] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31478] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31479] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31480] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31481] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-31482] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31483] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31484] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-31485] = "cpe-stable-backport: Backported in 6.12.80"
+
+# CVE-2026-31486 needs backporting (fixed from 7.0)
+
+CVE_STATUS[CVE-2026-31487] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31488] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31489] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31490] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-31491] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-31492] = "cpe-stable-backport: Backported in 6.12.80"
+
+# CVE-2026-31493 needs backporting (fixed from 7.0)
+
+CVE_STATUS[CVE-2026-31494] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31495] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31496] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31497] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31498] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31499] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-31500] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31501] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-31502] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31503] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31504] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31505] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31506] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31507] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31508] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31509] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31510] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31511] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31512] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31513] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31514] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31515] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31516] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31517] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-31518] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31519] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31520] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31521] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31522] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31523] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31524] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31525] = "cpe-stable-backport: Backported in 6.12.80"
+
+# CVE-2026-31526 needs backporting (fixed from 7.0)
+
+CVE_STATUS[CVE-2026-31527] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31528] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31529] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-31530] = "cpe-stable-backport: Backported in 6.12.80"
+
+CVE_STATUS[CVE-2026-31531] = "cpe-stable-backport: Backported in 6.12.83"
+
+# CVE-2026-31532 has no known resolution
+
CVE_STATUS[CVE-2026-31788] = "cpe-stable-backport: Backported in 6.12.78"
--
2.43.0
^ permalink raw reply related [flat|nested] 20+ messages in thread
* Re: [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
` (17 preceding siblings ...)
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 18/18] linux-yocto/6.12: update CVE exclusions (6.12.83) bruce.ashfield
@ 2026-04-24 15:00 ` Yoann Congal
18 siblings, 0 replies; 20+ messages in thread
From: Yoann Congal @ 2026-04-24 15:00 UTC (permalink / raw)
To: bruce.ashfield; +Cc: openembedded-core
On Thu Apr 23, 2026 at 5:44 PM CEST, bruce.ashfield wrote:
> From: Bruce Ashfield <bruce.ashfield@gmail.com>
>
> Hi all,
>
> I know that whinlatter is about to go EOL, but here are the stable
> updates I've been tracking for the kernel.
Sorry Bruce but I've stopped taking patch a while before you sent those.
They won't be merged on branch. The same goes for the kirkstone series.
> I'll continue to update 6.12 even after whinlatter is no longer
> being udpated.
You mean you will keep posting these upgrades on list for users that want
them?
Regards,
>
> Bruce
>
> openembedded-core (18):
> linux-yocto/6.12: update to v6.12.72
> linux-yocto/6.12: update CVE exclusions
> linux-yocto/6.12: update to v6.12.73
> linux-yocto/6.12: update CVE exclusions
> linux-yocto/6.12: update to v6.12.74
> linux-yocto/6.12: update CVE exclusions
> linux-yocto/6.12: update to v6.12.76
> linux-yocto/6.12: update CVE exclusions
> linux-yocto/6.12: update to v6.12.77
> linux-yocto/6.12: update CVE exclusions
> linux-yocto/6.12: update to v6.12.79
> linux-yocto/6.12: update CVE exclusions
> linux-yocto/6.12: update to v6.12.80
> linux-yocto/6.12: update CVE exclusions
> linux-yocto/6.12: update to v6.12.81
> linux-yocto/6.12: update CVE exclusions
> linux-yocto/6.12: update to v6.12.83
> linux-yocto/6.12: update CVE exclusions
>
> openembedded-core:
> meta/recipes-kernel/linux/cve-exclusion_6.12.inc | 1148 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++---------
> meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb | 6 +-
> meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb | 6 +-
> meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++---
> 4 files changed, 1127 insertions(+), 61 deletions(-)
--
Yoann Congal
Smile ECS
^ permalink raw reply [flat|nested] 20+ messages in thread
end of thread, other threads:[~2026-04-24 15:01 UTC | newest]
Thread overview: 20+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 01/18] linux-yocto/6.12: update to v6.12.72 bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 02/18] linux-yocto/6.12: update CVE exclusions (6.12.72) bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 03/18] linux-yocto/6.12: update to v6.12.73 bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 04/18] linux-yocto/6.12: update CVE exclusions (6.12.73) bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 05/18] linux-yocto/6.12: update to v6.12.74 bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 06/18] linux-yocto/6.12: update CVE exclusions (6.12.74) bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 07/18] linux-yocto/6.12: update to v6.12.76 bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 08/18] linux-yocto/6.12: update CVE exclusions (6.12.76) bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 09/18] linux-yocto/6.12: update to v6.12.77 bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 10/18] linux-yocto/6.12: update CVE exclusions (6.12.77) bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 11/18] linux-yocto/6.12: update to v6.12.79 bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 12/18] linux-yocto/6.12: update CVE exclusions (6.12.79) bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 13/18] linux-yocto/6.12: update to v6.12.80 bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 14/18] linux-yocto/6.12: update CVE exclusions (6.12.80) bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 15/18] linux-yocto/6.12: update to v6.12.81 bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 16/18] linux-yocto/6.12: update CVE exclusions (6.12.81) bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 17/18] linux-yocto/6.12: update to v6.12.83 bruce.ashfield
2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 18/18] linux-yocto/6.12: update CVE exclusions (6.12.83) bruce.ashfield
2026-04-24 15:00 ` [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 Yoann Congal
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox