* [OE-core][scarthgap 01/66] spdx30_tasks: fix condition in create_spdx
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 02/66] tzdata/tzcode-native: upgrade 2025c -> 2026a Yoann Congal
` (64 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: João Marcos Costa (Schneider Electric) <joaomarcos.costa@bootlin.com>
Considering that *detail* is an actual variable, not a string, remove the
quotes to make the 'in' statement coherent.
Signed-off-by: João Marcos Costa (Schneider Electric) <joaomarcos.costa@bootlin.com>
Reviewed-by: Joshua Watt <JPEWhacker@gmail.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/lib/oe/spdx30_tasks.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/lib/oe/spdx30_tasks.py b/meta/lib/oe/spdx30_tasks.py
index 9c422d17573..b43d626df36 100644
--- a/meta/lib/oe/spdx30_tasks.py
+++ b/meta/lib/oe/spdx30_tasks.py
@@ -535,7 +535,7 @@ def create_spdx(d):
# specified.
if (
include_vex != "all"
- and "detail" in ("fixed-version", "cpe-stable-backport")
+ and detail in ("fixed-version", "cpe-stable-backport")
):
bb.debug(1, "Skipping %s since it is already fixed upstream" % cve_id)
continue
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 02/66] tzdata/tzcode-native: upgrade 2025c -> 2026a
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 01/66] spdx30_tasks: fix condition in create_spdx Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 03/66] libarchive: Fix CVE-2026-4111 Yoann Congal
` (63 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Jinfeng Wang <jinfeng.wang.cn@windriver.com>
Signed-off-by: Jinfeng Wang <jinfeng.wang.cn@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 217ede26d64901d9a38fc119efa684487714c08a)
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-extended/timezone/timezone.inc | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/meta/recipes-extended/timezone/timezone.inc b/meta/recipes-extended/timezone/timezone.inc
index 35f22d5a15a..71b034d1581 100644
--- a/meta/recipes-extended/timezone/timezone.inc
+++ b/meta/recipes-extended/timezone/timezone.inc
@@ -6,7 +6,7 @@ SECTION = "base"
LICENSE = "PD & BSD-3-Clause"
LIC_FILES_CHKSUM = "file://LICENSE;md5=c679c9d6b02bc2757b3eaf8f53c43fba"
-PV = "2025c"
+PV = "2026a"
SRC_URI =" http://www.iana.org/time-zones/repository/releases/tzcode${PV}.tar.gz;name=tzcode;subdir=tz \
http://www.iana.org/time-zones/repository/releases/tzdata${PV}.tar.gz;name=tzdata;subdir=tz \
@@ -16,5 +16,5 @@ S = "${WORKDIR}/tz"
UPSTREAM_CHECK_URI = "http://www.iana.org/time-zones"
-SRC_URI[tzcode.sha256sum] = "697ebe6625444aef5080f58e49d03424bbb52e08bf483d3ddb5acf10cbd15740"
-SRC_URI[tzdata.sha256sum] = "4aa79e4effee53fc4029ffe5f6ebe97937282ebcdf386d5d2da91ce84142f957"
+SRC_URI[tzcode.sha256sum] = "f80a17a2eddd2b54041f9c98d75b0aa8038b016d7c5de72892a146d9938740e1"
+SRC_URI[tzdata.sha256sum] = "77b541725937bb53bd92bd484c0b43bec8545e2d3431ee01f04ef8f2203ba2b7"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 03/66] libarchive: Fix CVE-2026-4111
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 01/66] spdx30_tasks: fix condition in create_spdx Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 02/66] tzdata/tzcode-native: upgrade 2025c -> 2026a Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 04/66] curl: patch CVE-2026-1965 Yoann Congal
` (62 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Pick patch according to [1]
[1] https://security-tracker.debian.org/tracker/CVE-2026-4111
[2] https://github.com/libarchive/libarchive/pull/2877
[3] https://access.redhat.com/errata/RHSA-2026:5063
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../libarchive/CVE-2026-4111-1.patch | 32 ++
.../libarchive/CVE-2026-4111-2.patch | 308 ++++++++++++++++++
.../libarchive/libarchive_3.7.9.bb | 2 +
3 files changed, 342 insertions(+)
create mode 100644 meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-1.patch
create mode 100644 meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-2.patch
diff --git a/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-1.patch b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-1.patch
new file mode 100644
index 00000000000..f908b60775d
--- /dev/null
+++ b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-1.patch
@@ -0,0 +1,32 @@
+From 7273d04803a1e5a482f26d8d0fbaf2b204a72168 Mon Sep 17 00:00:00 2001
+From: Tim Kientzle <kientzle@acm.org>
+Date: Sun, 1 Mar 2026 20:24:56 -0800
+Subject: [PATCH] Reject filters when the block length is nonsensical
+
+Credit: Grzegorz Antoniak @antekone
+
+Upstream-Status: Backport [https://github.com/libarchive/libarchive/commit/7273d04803a1e5a482f26d8d0fbaf2b204a72168]
+CVE: CVE-2026-4111
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ libarchive/archive_read_support_format_rar5.c | 4 +++-
+ 1 file changed, 3 insertions(+), 1 deletion(-)
+
+diff --git a/libarchive/archive_read_support_format_rar5.c b/libarchive/archive_read_support_format_rar5.c
+index 1dd0d88..736c95a 100644
+--- a/libarchive/archive_read_support_format_rar5.c
++++ b/libarchive/archive_read_support_format_rar5.c
+@@ -2965,7 +2965,9 @@ static int parse_filter(struct archive_read* ar, const uint8_t* p) {
+ if(block_length < 4 ||
+ block_length > 0x400000 ||
+ filter_type > FILTER_ARM ||
+- !is_valid_filter_block_start(rar, block_start))
++ !is_valid_filter_block_start(rar, block_start) ||
++ (rar->cstate.window_size > 0 &&
++ (ssize_t)block_length > rar->cstate.window_size >> 1))
+ {
+ archive_set_error(&ar->archive, ARCHIVE_ERRNO_FILE_FORMAT,
+ "Invalid filter encountered");
+--
+2.43.0
+
diff --git a/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-2.patch b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-2.patch
new file mode 100644
index 00000000000..18037ed61ac
--- /dev/null
+++ b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-2.patch
@@ -0,0 +1,308 @@
+From ef53e2023d75a205cf7cbddb5d01c4cc592e9ce4 Mon Sep 17 00:00:00 2001
+From: Tim Kientzle <kientzle@acm.org>
+Date: Sun, 1 Mar 2026 10:04:01 -0800
+Subject: [PATCH] Infinite loop in Rar5 decompression
+
+Found by: Elhanan Haenel
+
+Upstream-Status: Backport [https://github.com/libarchive/libarchive/commit/ef53e2023d75a205cf7cbddb5d01c4cc592e9ce4]
+CVE: CVE-2026-4111
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ Makefile.am | 2 +
+ libarchive/test/CMakeLists.txt | 1 +
+ .../test/test_read_format_rar5_loop_bug.c | 53 +++++
+ .../test_read_format_rar5_loop_bug.rar.uu | 189 ++++++++++++++++++
+ 4 files changed, 245 insertions(+)
+ create mode 100644 libarchive/test/test_read_format_rar5_loop_bug.c
+ create mode 100644 libarchive/test/test_read_format_rar5_loop_bug.rar.uu
+
+diff --git a/Makefile.am b/Makefile.am
+index 7627ec5..e37312e 100644
+--- a/Makefile.am
++++ b/Makefile.am
+@@ -521,6 +521,7 @@ libarchive_test_SOURCES= \
+ libarchive/test/test_read_format_rar_invalid1.c \
+ libarchive/test/test_read_format_rar_overflow.c \
+ libarchive/test/test_read_format_rar5.c \
++ libarchive/test/test_read_format_rar5_loop_bug.c \
+ libarchive/test/test_read_format_raw.c \
+ libarchive/test/test_read_format_tar.c \
+ libarchive/test/test_read_format_tar_concatenated.c \
+@@ -918,6 +919,7 @@ libarchive_test_EXTRA_DIST=\
+ libarchive/test/test_read_format_rar5_invalid_dict_reference.rar.uu \
+ libarchive/test/test_read_format_rar5_leftshift1.rar.uu \
+ libarchive/test/test_read_format_rar5_leftshift2.rar.uu \
++ libarchive/test/test_read_format_rar5_loop_bug.rar.uu \
+ libarchive/test/test_read_format_rar5_multiarchive.part01.rar.uu \
+ libarchive/test/test_read_format_rar5_multiarchive.part02.rar.uu \
+ libarchive/test/test_read_format_rar5_multiarchive.part03.rar.uu \
+diff --git a/libarchive/test/CMakeLists.txt b/libarchive/test/CMakeLists.txt
+index 59c5f5d..d7ec64e 100644
+--- a/libarchive/test/CMakeLists.txt
++++ b/libarchive/test/CMakeLists.txt
+@@ -165,6 +165,7 @@ IF(ENABLE_TEST)
+ test_read_format_rar_filter.c
+ test_read_format_rar_overflow.c
+ test_read_format_rar5.c
++ test_read_format_rar5_loop_bug.c
+ test_read_format_raw.c
+ test_read_format_tar.c
+ test_read_format_tar_concatenated.c
+diff --git a/libarchive/test/test_read_format_rar5_loop_bug.c b/libarchive/test/test_read_format_rar5_loop_bug.c
+new file mode 100644
+index 0000000..77dd78c
+--- /dev/null
++++ b/libarchive/test/test_read_format_rar5_loop_bug.c
+@@ -0,0 +1,53 @@
++/*-
++ * Copyright (c) 2026 Tim Kientzle
++ * All rights reserved.
++ *
++ * Redistribution and use in source and binary forms, with or without
++ * modification, are permitted provided that the following conditions
++ * are met:
++ * 1. Redistributions of source code must retain the above copyright
++ * notice, this list of conditions and the following disclaimer.
++ * 2. Redistributions in binary form must reproduce the above copyright
++ * notice, this list of conditions and the following disclaimer in the
++ * documentation and/or other materials provided with the distribution.
++ *
++ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
++ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
++ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
++ * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
++ * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
++ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
++ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
++ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
++ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
++ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
++ */
++#include "test.h"
++
++DEFINE_TEST(test_read_format_rar5_loop_bug)
++{
++ const char *reffile = "test_read_format_rar5_loop_bug.rar";
++ struct archive_entry *ae;
++ struct archive *a;
++ const void *buf;
++ size_t size;
++ la_int64_t offset;
++
++ extract_reference_file(reffile);
++ assert((a = archive_read_new()) != NULL);
++ assertEqualIntA(a, ARCHIVE_OK, archive_read_support_filter_all(a));
++ assertEqualIntA(a, ARCHIVE_OK, archive_read_support_format_all(a));
++ assertEqualIntA(a, ARCHIVE_OK, archive_read_open_filename(a, reffile, 10240));
++
++ // This has just one entry
++ assertEqualIntA(a, ARCHIVE_OK, archive_read_next_header(a, &ae));
++
++ // Read blocks until the end of the entry
++ while (ARCHIVE_OK == archive_read_data_block(a, &buf, &size, &offset)) {
++ }
++
++ assertEqualIntA(a, ARCHIVE_EOF, archive_read_next_header(a, &ae));
++
++ assertEqualIntA(a, ARCHIVE_OK, archive_read_close(a));
++ assertEqualInt(ARCHIVE_OK, archive_free(a));
++}
+diff --git a/libarchive/test/test_read_format_rar5_loop_bug.rar.uu b/libarchive/test/test_read_format_rar5_loop_bug.rar.uu
+new file mode 100644
+index 0000000..3e47004
+--- /dev/null
++++ b/libarchive/test/test_read_format_rar5_loop_bug.rar.uu
+@@ -0,0 +1,189 @@
++begin 644 test_read_format_rar5_loop_bug.rar
++M4F%R(1H'`0#%&C,R`P$``)T-9%L.`@+P0`"`@`P`@`,``6'(WFP@`?\7_U/^
++M8@!.`B`H````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++M````````````````````````````````````````````````````````````
++5```````````````````Y^;*!`@4`
++`
++end
+--
+2.43.0
+
diff --git a/meta/recipes-extended/libarchive/libarchive_3.7.9.bb b/meta/recipes-extended/libarchive/libarchive_3.7.9.bb
index b62c3d69b95..bc0d3ba0743 100644
--- a/meta/recipes-extended/libarchive/libarchive_3.7.9.bb
+++ b/meta/recipes-extended/libarchive/libarchive_3.7.9.bb
@@ -44,6 +44,8 @@ SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz \
file://0001-Merge-pull-request-2768-from-Commandoss-master.patch \
file://CVE-2025-60753-01.patch \
file://CVE-2025-60753-02.patch \
+ file://CVE-2026-4111-1.patch \
+ file://CVE-2026-4111-2.patch \
"
UPSTREAM_CHECK_URI = "http://libarchive.org/"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 04/66] curl: patch CVE-2026-1965
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (2 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 03/66] libarchive: Fix CVE-2026-4111 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 05/66] curl: patch CVE-2026-3783 Yoann Congal
` (61 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
pick patches from ubuntu per [1]
[1] http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz
[2] https://ubuntu.com/security/CVE-2026-1965
[3] https://curl.se/docs/CVE-2026-1965.html
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../curl/curl/CVE-2026-1965-1.patch | 102 ++++++++++++++++++
.../curl/curl/CVE-2026-1965-2.patch | 34 ++++++
meta/recipes-support/curl/curl_8.7.1.bb | 2 +
3 files changed, 138 insertions(+)
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-1965-1.patch
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-1965-2.patch
diff --git a/meta/recipes-support/curl/curl/CVE-2026-1965-1.patch b/meta/recipes-support/curl/curl/CVE-2026-1965-1.patch
new file mode 100644
index 00000000000..acc8bfe0442
--- /dev/null
+++ b/meta/recipes-support/curl/curl/CVE-2026-1965-1.patch
@@ -0,0 +1,102 @@
+From 34fa034d9a390c4bd65e2d05262755ec8646ac12 Mon Sep 17 00:00:00 2001
+From: Daniel Stenberg <daniel@haxx.se>
+Date: Thu, 5 Feb 2026 08:34:21 +0100
+Subject: [PATCH] url: fix reuse of connections using HTTP Negotiate
+
+Assume Negotiate means connection-based
+
+Reported-by: Zhicheng Chen
+Closes #20534
+
+Upstream-Status: Backport [https://github.com/curl/curl/commit/34fa034d9a390c4bd6]
+Backported by Ubuntu team http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz
+
+CVE: CVE-2026-1965
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ lib/url.c | 62 +++++++++++++++++++++++++++++++++++++++++++++++++++++++
+ 1 file changed, 62 insertions(+)
+
+diff --git a/lib/url.c b/lib/url.c
+index 1439c9e..792c422 100644
+--- a/lib/url.c
++++ b/lib/url.c
+@@ -936,6 +936,18 @@ ConnectionExists(struct Curl_easy *data,
+ #else
+ bool wantProxyNTLMhttp = FALSE;
+ #endif
++#endif
++
++#if !defined(CURL_DISABLE_HTTP) && defined(USE_SPNEGO)
++ bool wantNegohttp =
++ (data->state.authhost.want & CURLAUTH_NEGOTIATE) &&
++ (needle->handler->protocol & PROTO_FAMILY_HTTP);
++#ifndef CURL_DISABLE_PROXY
++ bool wantProxyNegohttp =
++ needle->bits.proxy_user_passwd &&
++ (data->state.authproxy.want & CURLAUTH_NEGOTIATE) &&
++ (needle->handler->protocol & PROTO_FAMILY_HTTP);
++#endif
+ #endif
+ /* plain HTTP with upgrade */
+ bool h2upgrade = (data->state.httpwant == CURL_HTTP_VERSION_2_0) &&
+@@ -1274,6 +1286,56 @@ ConnectionExists(struct Curl_easy *data,
+ }
+ #endif
+
++#ifdef USE_SPNEGO
++ /* If we are looking for an HTTP+Negotiate connection, check if this is
++ already authenticating with the right credentials. If not, keep looking
++ so that we can reuse Negotiate connections if possible. */
++ if(wantNegohttp) {
++ if(Curl_timestrcmp(needle->user, check->user) ||
++ Curl_timestrcmp(needle->passwd, check->passwd))
++ continue;
++ }
++ else if(check->http_negotiate_state != GSS_AUTHNONE) {
++ /* Connection is using Negotiate auth but we do not want Negotiate */
++ continue;
++ }
++
++#ifndef CURL_DISABLE_PROXY
++ /* Same for Proxy Negotiate authentication */
++ if(wantProxyNegohttp) {
++ /* Both check->http_proxy.user and check->http_proxy.passwd can be
++ * NULL */
++ if(!check->http_proxy.user || !check->http_proxy.passwd)
++ continue;
++
++ if(Curl_timestrcmp(needle->http_proxy.user,
++ check->http_proxy.user) ||
++ Curl_timestrcmp(needle->http_proxy.passwd,
++ check->http_proxy.passwd))
++ continue;
++ }
++ else if(check->proxy_negotiate_state != GSS_AUTHNONE) {
++ /* Proxy connection is using Negotiate auth but we do not want Negotiate */
++ continue;
++ }
++#endif
++ if(wantNTLMhttp || wantProxyNTLMhttp) {
++ /* Credentials are already checked, we may use this connection. We MUST
++ * use a connection where it has already been fully negotiated. If it has
++ * not, we keep on looking for a better one. */
++ chosen = check;
++ if((wantNegohttp &&
++ (check->http_negotiate_state != GSS_AUTHNONE)) ||
++ (wantProxyNegohttp &&
++ (check->proxy_negotiate_state != GSS_AUTHNONE))) {
++ /* We must use this connection, no other */
++ *force_reuse = TRUE;
++ break;
++ }
++ continue; /* get another */
++ }
++#endif
++
+ if(CONN_INUSE(check)) {
+ DEBUGASSERT(canmultiplex);
+ DEBUGASSERT(check->bits.multiplex);
+--
+2.43.0
+
diff --git a/meta/recipes-support/curl/curl/CVE-2026-1965-2.patch b/meta/recipes-support/curl/curl/CVE-2026-1965-2.patch
new file mode 100644
index 00000000000..07dbf4e973b
--- /dev/null
+++ b/meta/recipes-support/curl/curl/CVE-2026-1965-2.patch
@@ -0,0 +1,34 @@
+From f1a39f221d57354990e3eeeddc3404aede2aff70 Mon Sep 17 00:00:00 2001
+From: Daniel Stenberg <daniel@haxx.se>
+Date: Sat, 21 Feb 2026 18:11:41 +0100
+Subject: [PATCH] url: fix copy and paste url_match_auth_nego mistake
+
+Follow-up to 34fa034
+Reported-by: dahmono on github
+Closes #20662
+
+Upstream-Status: Backport [https://github.com/curl/curl/commit/f1a39f221d57354990]
+Backported by Ubuntu team http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz
+
+CVE: CVE-2026-1965
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ lib/url.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/lib/url.c b/lib/url.c
+index 792c422..22ed0be 100644
+--- a/lib/url.c
++++ b/lib/url.c
+@@ -1319,7 +1319,7 @@ ConnectionExists(struct Curl_easy *data,
+ continue;
+ }
+ #endif
+- if(wantNTLMhttp || wantProxyNTLMhttp) {
++ if(wantNegohttp || wantProxyNegohttp) {
+ /* Credentials are already checked, we may use this connection. We MUST
+ * use a connection where it has already been fully negotiated. If it has
+ * not, we keep on looking for a better one. */
+--
+2.43.0
+
diff --git a/meta/recipes-support/curl/curl_8.7.1.bb b/meta/recipes-support/curl/curl_8.7.1.bb
index 9e37684b2cc..0b4c93ec66c 100644
--- a/meta/recipes-support/curl/curl_8.7.1.bb
+++ b/meta/recipes-support/curl/curl_8.7.1.bb
@@ -32,6 +32,8 @@ SRC_URI = " \
file://CVE-2025-14819.patch \
file://CVE-2025-15079.patch \
file://CVE-2025-15224.patch \
+ file://CVE-2026-1965-1.patch \
+ file://CVE-2026-1965-2.patch \
"
SRC_URI:append:class-nativesdk = " \
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 05/66] curl: patch CVE-2026-3783
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (3 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 04/66] curl: patch CVE-2026-1965 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 06/66] curl: patch CVE-2026-3784 Yoann Congal
` (60 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
pick patches from ubuntu per [1]
[1] http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz
[2] https://ubuntu.com/security/CVE-2026-3783
[3] https://curl.se/docs/CVE-2026-3783.html
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../curl/curl/CVE-2026-3783.patch | 153 ++++++++++++++++++
meta/recipes-support/curl/curl_8.7.1.bb | 1 +
2 files changed, 154 insertions(+)
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-3783.patch
diff --git a/meta/recipes-support/curl/curl/CVE-2026-3783.patch b/meta/recipes-support/curl/curl/CVE-2026-3783.patch
new file mode 100644
index 00000000000..609b519ddb4
--- /dev/null
+++ b/meta/recipes-support/curl/curl/CVE-2026-3783.patch
@@ -0,0 +1,153 @@
+From e3d7401a32a46516c9e5ee877e613e62ed35bddc Mon Sep 17 00:00:00 2001
+From: Daniel Stenberg <daniel@haxx.se>
+Date: Fri, 6 Mar 2026 23:13:07 +0100
+Subject: [PATCH] http: only send bearer if auth is allowed
+
+Verify with test 2006
+
+Closes #20843
+
+Upstream-Status: Backport [https://github.com/curl/curl/commit/e3d7401a32a46516c9e5ee877]
+Backported by Ubuntu team http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz
+
+CVE: CVE-2026-3783
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ lib/http.c | 1 +
+ tests/data/Makefile.inc | 2 +-
+ tests/data/test2006 | 98 +++++++++++++++++++++++++++++++++++++++++
+ 3 files changed, 100 insertions(+), 1 deletion(-)
+ create mode 100644 tests/data/test2006
+
+diff --git a/lib/http.c b/lib/http.c
+index a764d3c..b80bebf 100644
+--- a/lib/http.c
++++ b/lib/http.c
+@@ -673,6 +673,7 @@ output_auth_headers(struct Curl_easy *data,
+ if(authstatus->picked == CURLAUTH_BEARER) {
+ /* Bearer */
+ if((!proxy && data->set.str[STRING_BEARER] &&
++ Curl_auth_allowed_to_host(data) &&
+ !Curl_checkheaders(data, STRCONST("Authorization")))) {
+ auth = "Bearer";
+ result = http_output_bearer(data);
+diff --git a/tests/data/Makefile.inc b/tests/data/Makefile.inc
+index 4c2cd52..9fb9274 100644
+--- a/tests/data/Makefile.inc
++++ b/tests/data/Makefile.inc
+@@ -230,7 +230,7 @@ test1941 test1942 test1943 test1944 test1945 test1946 test1947 test1948 \
+ test1955 test1956 test1957 test1958 test1959 test1960 test1964 \
+ test1970 test1971 test1972 test1973 test1974 test1975 \
+ \
+-test2000 test2001 test2002 test2003 test2004 test2005 \
++test2000 test2001 test2002 test2003 test2004 test2005 test2006 \
+ \
+ test2023 \
+ test2024 test2025 test2026 test2027 test2028 test2029 test2030 test2031 \
+diff --git a/tests/data/test2006 b/tests/data/test2006
+new file mode 100644
+index 0000000..4b8b269
+--- /dev/null
++++ b/tests/data/test2006
+@@ -0,0 +1,98 @@
++<?xml version="1.0" encoding="US-ASCII"?>
++<testcase>
++<info>
++<keywords>
++netrc
++HTTP
++</keywords>
++</info>
++# Server-side
++<reply>
++<data crlf="yes">
++HTTP/1.1 301 Follow this you fool
++Date: Tue, 09 Nov 2010 14:49:00 GMT
++Server: test-server/fake
++Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT
++ETag: "21025-dc7-39462498"
++Accept-Ranges: bytes
++Content-Length: 6
++Connection: close
++Location: http://b.com/%TESTNUMBER0002
++
++-foo-
++</data>
++
++<data2 crlf="yes">
++HTTP/1.1 200 OK
++Date: Tue, 09 Nov 2010 14:49:00 GMT
++Server: test-server/fake
++Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT
++ETag: "21025-dc7-39462498"
++Accept-Ranges: bytes
++Content-Length: 7
++Connection: close
++
++target
++</data2>
++
++<datacheck crlf="yes">
++HTTP/1.1 301 Follow this you fool
++Date: Tue, 09 Nov 2010 14:49:00 GMT
++Server: test-server/fake
++Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT
++ETag: "21025-dc7-39462498"
++Accept-Ranges: bytes
++Content-Length: 6
++Connection: close
++Location: http://b.com/%TESTNUMBER0002
++
++HTTP/1.1 200 OK
++Date: Tue, 09 Nov 2010 14:49:00 GMT
++Server: test-server/fake
++Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT
++ETag: "21025-dc7-39462498"
++Accept-Ranges: bytes
++Content-Length: 7
++Connection: close
++
++target
++</datacheck>
++</reply>
++
++# Client-side
++<client>
++<server>
++http
++</server>
++<features>
++proxy
++</features>
++<name>
++.netrc default with redirect plus oauth2-bearer
++</name>
++<command>
++--netrc --netrc-file %LOGDIR/netrc%TESTNUMBER --oauth2-bearer SECRET_TOKEN -L -x http://%HOSTIP:%HTTPPORT/ http://a.com/
++</command>
++<file name="%LOGDIR/netrc%TESTNUMBER" >
++default login testuser password testpass
++</file>
++</client>
++
++<verify>
++<protocol crlf="yes">
++GET http://a.com/ HTTP/1.1
++Host: a.com
++Authorization: Bearer SECRET_TOKEN
++User-Agent: curl/%VERSION
++Accept: */*
++Proxy-Connection: Keep-Alive
++
++GET http://b.com/%TESTNUMBER0002 HTTP/1.1
++Host: b.com
++User-Agent: curl/%VERSION
++Accept: */*
++Proxy-Connection: Keep-Alive
++
++</protocol>
++</verify>
++</testcase>
+--
+2.43.0
+
diff --git a/meta/recipes-support/curl/curl_8.7.1.bb b/meta/recipes-support/curl/curl_8.7.1.bb
index 0b4c93ec66c..ff4524e1bd1 100644
--- a/meta/recipes-support/curl/curl_8.7.1.bb
+++ b/meta/recipes-support/curl/curl_8.7.1.bb
@@ -34,6 +34,7 @@ SRC_URI = " \
file://CVE-2025-15224.patch \
file://CVE-2026-1965-1.patch \
file://CVE-2026-1965-2.patch \
+ file://CVE-2026-3783.patch \
"
SRC_URI:append:class-nativesdk = " \
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 06/66] curl: patch CVE-2026-3784
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (4 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 05/66] curl: patch CVE-2026-3783 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 07/66] ncurses: fix for CVE-2025-69720 Yoann Congal
` (59 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
pick patch from ubuntu per [1]
[1] http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz
[2] https://ubuntu.com/security/CVE-2026-3784
[3] https://curl.se/docs/CVE-2026-3784.html
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../curl/curl/CVE-2026-3784.patch | 77 +++++++++++++++++++
meta/recipes-support/curl/curl_8.7.1.bb | 1 +
2 files changed, 78 insertions(+)
create mode 100644 meta/recipes-support/curl/curl/CVE-2026-3784.patch
diff --git a/meta/recipes-support/curl/curl/CVE-2026-3784.patch b/meta/recipes-support/curl/curl/CVE-2026-3784.patch
new file mode 100644
index 00000000000..c3bdb672474
--- /dev/null
+++ b/meta/recipes-support/curl/curl/CVE-2026-3784.patch
@@ -0,0 +1,77 @@
+From 5f13a7645e565c5c1a06f3ef86e97afb856fb364 Mon Sep 17 00:00:00 2001
+From: Stefan Eissing <stefan@eissing.org>
+Date: Fri, 6 Mar 2026 14:54:09 +0100
+Subject: [PATCH] proxy-auth: additional tests
+
+Also eliminate the special handling for socks proxy match.
+
+Closes #20837
+
+Upstream-Status: Backport [https://github.com/curl/curl/commit/5f13a7645e565c5c1a06f3]
+Backported by Ubuntu team http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz
+
+CVE: CVE-2026-3784
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ lib/url.c | 35 ++++++++---------------------------
+ 1 file changed, 8 insertions(+), 27 deletions(-)
+
+diff --git a/lib/url.c b/lib/url.c
+index 22ed0be..76360c8 100644
+--- a/lib/url.c
++++ b/lib/url.c
+@@ -703,34 +703,15 @@ proxy_info_matches(const struct proxy_info *data,
+ {
+ if((data->proxytype == needle->proxytype) &&
+ (data->port == needle->port) &&
+- strcasecompare(data->host.name, needle->host.name))
+- return TRUE;
++ curl_strequal(data->host.name, needle->host.name)) {
+
++ if(Curl_timestrcmp(data->user, needle->user) ||
++ Curl_timestrcmp(data->passwd, needle->passwd))
++ return FALSE;
++ return TRUE;
++ }
+ return FALSE;
+ }
+-
+-static bool
+-socks_proxy_info_matches(const struct proxy_info *data,
+- const struct proxy_info *needle)
+-{
+- if(!proxy_info_matches(data, needle))
+- return FALSE;
+-
+- /* the user information is case-sensitive
+- or at least it is not defined as case-insensitive
+- see https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.1 */
+-
+- /* curl_strequal does a case insensitive comparison,
+- so do not use it here! */
+- if(Curl_timestrcmp(data->user, needle->user) ||
+- Curl_timestrcmp(data->passwd, needle->passwd))
+- return FALSE;
+- return TRUE;
+-}
+-#else
+-/* disabled, won't get called */
+-#define proxy_info_matches(x,y) FALSE
+-#define socks_proxy_info_matches(x,y) FALSE
+ #endif
+
+ /* A connection has to have been idle for a shorter time than 'maxage_conn'
+@@ -1085,8 +1066,8 @@ ConnectionExists(struct Curl_easy *data,
+ continue;
+
+ if(needle->bits.socksproxy &&
+- !socks_proxy_info_matches(&needle->socks_proxy,
+- &check->socks_proxy))
++ !proxy_info_matches(&needle->socks_proxy,
++ &check->socks_proxy))
+ continue;
+
+ if(needle->bits.httpproxy) {
+--
+2.43.0
+
diff --git a/meta/recipes-support/curl/curl_8.7.1.bb b/meta/recipes-support/curl/curl_8.7.1.bb
index ff4524e1bd1..14d63d63733 100644
--- a/meta/recipes-support/curl/curl_8.7.1.bb
+++ b/meta/recipes-support/curl/curl_8.7.1.bb
@@ -35,6 +35,7 @@ SRC_URI = " \
file://CVE-2026-1965-1.patch \
file://CVE-2026-1965-2.patch \
file://CVE-2026-3783.patch \
+ file://CVE-2026-3784.patch \
"
SRC_URI:append:class-nativesdk = " \
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 07/66] ncurses: fix for CVE-2025-69720
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (5 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 06/66] curl: patch CVE-2026-3784 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 08/66] tcl: skip http11 tests Yoann Congal
` (58 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Hitendra Prajapati <hprajapati@mvista.com>
Pick relevant part of snapshot commit 20251213, see [1].
That has:
add a limit-check in infocmp -i option (report/example by Yixuan Cao).
[1] https://invisible-island.net/ncurses/NEWS.html#index-t20251213
References:
1. https://github.com/Cao-Wuhui/CVE-2025-69720
2. https://nvd.nist.gov/vuln/detail/CVE-2025-69720
3. https://access.redhat.com/errata/RHSA-2026:5913
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../ncurses/files/CVE-2025-69720.patch | 42 +++++++++++++++++++
meta/recipes-core/ncurses/ncurses_6.4.bb | 1 +
2 files changed, 43 insertions(+)
create mode 100644 meta/recipes-core/ncurses/files/CVE-2025-69720.patch
diff --git a/meta/recipes-core/ncurses/files/CVE-2025-69720.patch b/meta/recipes-core/ncurses/files/CVE-2025-69720.patch
new file mode 100644
index 00000000000..8ab6953c855
--- /dev/null
+++ b/meta/recipes-core/ncurses/files/CVE-2025-69720.patch
@@ -0,0 +1,42 @@
+From 6f6db0e8fd14e40096a0ee6f8bdf32dedbd3fc9e Mon Sep 17 00:00:00 2001
+From: Hitendra Prajapati <hprajapati@mvista.com>
+Date: Mon, 6 Apr 2026 18:08:09 +0530
+Subject: [PATCH] add limit-check in infocmp
+
+origin : https://invisible-island.net/archives/ncurses/6.5/ncurses-6.5-20251213.patch.gz
+Refer: https://github.com/Cao-Wuhui/CVE-2025-69720
+patch by : Thomas E. Dickey <dickey@invisible-island.net>
+
+CVE: CVE-2025-69720
+Upstream-Status: Backport [https://github.com/ThomasDickey/ncurses-snapshots/commit/6f6db0e8fd14e40096a0ee6f8bdf32dedbd3fc9e]
+Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
+---
+ progs/infocmp.c | 5 +++--
+ 1 file changed, 3 insertions(+), 2 deletions(-)
+
+diff --git a/progs/infocmp.c b/progs/infocmp.c
+index 171d794d..2fc1f035 100644
+--- a/progs/infocmp.c
++++ b/progs/infocmp.c
+@@ -816,7 +816,7 @@ lookup_params(const assoc * table, char *dst, char *src)
+ static void
+ analyze_string(const char *name, const char *cap, TERMTYPE2 *tp)
+ {
+- char buf2[MAX_TERMINFO_LENGTH];
++ char buf2[MAX_TERMINFO_LENGTH + 1];
+ const char *sp;
+ const assoc *ap;
+ int tp_lines = tp->Numbers[2];
+@@ -846,7 +846,8 @@ analyze_string(const char *name, const char *cap, TERMTYPE2 *tp)
+ if (VALID_STRING(cp) &&
+ cp[0] != '\0' &&
+ cp != cap) {
+- len = strlen(cp);
++ if ((len = strlen(cp)) > MAX_TERMINFO_LENGTH)
++ len = MAX_TERMINFO_LENGTH;
+ _nc_STRNCPY(buf2, sp, len);
+ buf2[len] = '\0';
+
+--
+2.50.1
+
diff --git a/meta/recipes-core/ncurses/ncurses_6.4.bb b/meta/recipes-core/ncurses/ncurses_6.4.bb
index d3b41061183..ac30a1a3c1e 100644
--- a/meta/recipes-core/ncurses/ncurses_6.4.bb
+++ b/meta/recipes-core/ncurses/ncurses_6.4.bb
@@ -9,6 +9,7 @@ SRC_URI += "file://0001-tic-hang.patch \
file://CVE-2023-50495.patch \
file://CVE-2023-45918.patch \
file://CVE-2025-6141.patch \
+ file://CVE-2025-69720.patch \
"
# commit id corresponds to the revision in package version
SRCREV = "1003914e200fd622a27237abca155ce6bf2e6030"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 08/66] tcl: skip http11 tests
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (6 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 07/66] ncurses: fix for CVE-2025-69720 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 09/66] busybox: fix for CVE-2026-26157, CVE-2026-26158 Yoann Congal
` (57 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Ross Burton <ross.burton@arm.com>
These tests are either unstable under load, or just unstable.
A ticket has been filed upstream[1] but for now disable them.
[ YOCTO #15467 ]
[1] https://core.tcl-lang.org/tcl/tktview/3764f4e81f1483ab554c6d60f8483887bde28221
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 8f1538518fd3a3017189b38437691ce358a2566a)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-devtools/tcltk/tcl/run-ptest | 3 +++
1 file changed, 3 insertions(+)
diff --git a/meta/recipes-devtools/tcltk/tcl/run-ptest b/meta/recipes-devtools/tcltk/tcl/run-ptest
index c485e535c71..8a4edfdda39 100644
--- a/meta/recipes-devtools/tcltk/tcl/run-ptest
+++ b/meta/recipes-devtools/tcltk/tcl/run-ptest
@@ -19,6 +19,9 @@ SKIP="$SKIP \*io-46.1"
SKIP="$SKIP io-13.6"
# 14825
SKIP="$SKIP socket-\* socket_inet-\*"
+# These tests seem to be unreliable:
+# https://core.tcl-lang.org/tcl/tktview/3764f4e81f1483ab554c6d60f8483887bde28221
+SKIP="$SKIP http11-\*"
for i in tests/*.test; do
i=$(basename $i)
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 09/66] busybox: fix for CVE-2026-26157, CVE-2026-26158
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (7 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 08/66] tcl: skip http11 tests Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 10/66] binutils: mark CVE-2025-69650 and CVE-2025-69651 as disputed Yoann Congal
` (56 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Hitendra Prajapati <hprajapati@mvista.com>
Pick up patch from NVD report.
More details :
[1]: https://nvd.nist.gov/vuln/detail/CVE-2026-26157
[2]: https://nvd.nist.gov/vuln/detail/CVE-2026-26158
Note:
We use patch from busybox mirror that looks trustworthy https://gogs.librecmc.org/OWEALS/busybox.
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../CVE-2026-26157-CVE-2026-26158-01.patch | 198 ++++++++++++++++++
.../CVE-2026-26157-CVE-2026-26158-02.patch | 37 ++++
meta/recipes-core/busybox/busybox_1.36.1.bb | 2 +
3 files changed, 237 insertions(+)
create mode 100644 meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-01.patch
create mode 100644 meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-02.patch
diff --git a/meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-01.patch b/meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-01.patch
new file mode 100644
index 00000000000..cdc23947949
--- /dev/null
+++ b/meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-01.patch
@@ -0,0 +1,198 @@
+From 3fb6b31c716669e12f75a2accd31bb7685b1a1cb Mon Sep 17 00:00:00 2001
+From: Denys Vlasenko <vda.linux@googlemail.com>
+Date: Thu, 29 Jan 2026 11:48:02 +0100
+Subject: [PATCH] tar: strip unsafe hardlink components - GNU tar does the same
+
+Defends against files like these (python reproducer):
+
+import tarfile
+ti = tarfile.TarInfo("leak_hosts")
+ti.type = tarfile.LNKTYPE
+ti.linkname = "/etc/hosts" # or "../etc/hosts" or ".."
+ti.size = 0
+with tarfile.open("/tmp/hardlink.tar", "w") as t:
+ t.addfile(ti)
+
+function old new delta
+skip_unsafe_prefix - 127 +127
+get_header_tar 1752 1754 +2
+.rodata 106861 106856 -5
+unzip_main 2715 2706 -9
+strip_unsafe_prefix 102 18 -84
+------------------------------------------------------------------------------
+(add/remove: 1/0 grow/shrink: 1/3 up/down: 129/-98) Total: 31 bytes
+
+Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
+
+CVE: CVE-2026-26157, CVE-2026-26158
+Upstream-Status: Backport [https://git.busybox.net/busybox/commit/?id=3fb6b31c716669e12f75a2accd31bb7685b1a1cb]
+(Alternative mirrored URL: https://gogs.librecmc.org/OWEALS/busybox/commit/3fb6b31c716669e12f75a2accd31bb7685b1a1cb)
+Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
+---
+ archival/libarchive/data_extract_all.c | 7 +++--
+ archival/libarchive/get_header_tar.c | 11 ++++++--
+ archival/libarchive/unsafe_prefix.c | 30 +++++++++++++++++----
+ archival/libarchive/unsafe_symlink_target.c | 1 +
+ archival/tar.c | 2 +-
+ archival/unzip.c | 2 +-
+ include/bb_archive.h | 3 ++-
+ 7 files changed, 42 insertions(+), 14 deletions(-)
+
+diff --git a/archival/libarchive/data_extract_all.c b/archival/libarchive/data_extract_all.c
+index 8a69711..b84b960 100644
+--- a/archival/libarchive/data_extract_all.c
++++ b/archival/libarchive/data_extract_all.c
+@@ -66,8 +66,8 @@ void FAST_FUNC data_extract_all(archive_handle_t *archive_handle)
+ }
+ #endif
+ #if ENABLE_FEATURE_PATH_TRAVERSAL_PROTECTION
+- /* Strip leading "/" and up to last "/../" path component */
+- dst_name = (char *)strip_unsafe_prefix(dst_name);
++ /* Skip leading "/" and past last ".." path component */
++ dst_name = (char *)skip_unsafe_prefix(dst_name);
+ #endif
+ // ^^^ This may be a problem if some applets do need to extract absolute names.
+ // (Probably will need to invent ARCHIVE_ALLOW_UNSAFE_NAME flag).
+@@ -185,8 +185,7 @@ void FAST_FUNC data_extract_all(archive_handle_t *archive_handle)
+
+ /* To avoid a directory traversal attack via symlinks,
+ * do not restore symlinks with ".." components
+- * or symlinks starting with "/", unless a magic
+- * envvar is set.
++ * or symlinks starting with "/"
+ *
+ * For example, consider a .tar created via:
+ * $ tar cvf bug.tar anything.txt
+diff --git a/archival/libarchive/get_header_tar.c b/archival/libarchive/get_header_tar.c
+index cc6f3f0..1c40ece 100644
+--- a/archival/libarchive/get_header_tar.c
++++ b/archival/libarchive/get_header_tar.c
+@@ -454,8 +454,15 @@ char FAST_FUNC get_header_tar(archive_handle_t *archive_handle)
+ #endif
+
+ /* Everything up to and including last ".." component is stripped */
+- overlapping_strcpy(file_header->name, strip_unsafe_prefix(file_header->name));
+-//TODO: do the same for file_header->link_target?
++ strip_unsafe_prefix(file_header->name);
++ if (file_header->link_target) {
++ /* GNU tar 1.34 examples:
++ * tar: Removing leading '/' from hard link targets
++ * tar: Removing leading '../' from hard link targets
++ * tar: Removing leading 'etc/../' from hard link targets
++ */
++ strip_unsafe_prefix(file_header->link_target);
++ }
+
+ /* Strip trailing '/' in directories */
+ /* Must be done after mode is set as '/' is used to check if it's a directory */
+diff --git a/archival/libarchive/unsafe_prefix.c b/archival/libarchive/unsafe_prefix.c
+index 6670811..89a371a 100644
+--- a/archival/libarchive/unsafe_prefix.c
++++ b/archival/libarchive/unsafe_prefix.c
+@@ -5,11 +5,11 @@
+ #include "libbb.h"
+ #include "bb_archive.h"
+
+-const char* FAST_FUNC strip_unsafe_prefix(const char *str)
++const char* FAST_FUNC skip_unsafe_prefix(const char *str)
+ {
+ const char *cp = str;
+ while (1) {
+- char *cp2;
++ const char *cp2;
+ if (*cp == '/') {
+ cp++;
+ continue;
+@@ -22,10 +22,25 @@ const char* FAST_FUNC strip_unsafe_prefix(const char *str)
+ cp += 3;
+ continue;
+ }
+- cp2 = strstr(cp, "/../");
++ cp2 = cp;
++ find_dotdot:
++ cp2 = strstr(cp2, "/..");
+ if (!cp2)
+- break;
+- cp = cp2 + 4;
++ break; /* No (more) malicious components */
++
++ /* We found "/..something" */
++ cp2 += 3;
++ if (*cp2 != '/') {
++ if (*cp2 == '\0') {
++ /* Trailing "/..": malicious, return "" */
++ /* (causes harmless errors trying to create or hardlink a file named "") */
++ return cp2;
++ }
++ /* "/..name" is not malicious, look for next "/.." */
++ goto find_dotdot;
++ }
++ /* Found "/../": malicious, advance past it */
++ cp = cp2 + 1;
+ }
+ if (cp != str) {
+ static smallint warned = 0;
+@@ -37,3 +52,8 @@ const char* FAST_FUNC strip_unsafe_prefix(const char *str)
+ }
+ return cp;
+ }
++
++void FAST_FUNC strip_unsafe_prefix(char *str)
++{
++ overlapping_strcpy(str, skip_unsafe_prefix(str));
++}
+diff --git a/archival/libarchive/unsafe_symlink_target.c b/archival/libarchive/unsafe_symlink_target.c
+index f8dc803..d764c89 100644
+--- a/archival/libarchive/unsafe_symlink_target.c
++++ b/archival/libarchive/unsafe_symlink_target.c
+@@ -36,6 +36,7 @@ void FAST_FUNC create_links_from_list(llist_t *list)
+ *list->data ? "hard" : "sym",
+ list->data + 1, target
+ );
++ /* Note: GNU tar 1.34 errors out only _after_ all links are (attempted to be) created */
+ }
+ list = list->link;
+ }
+diff --git a/archival/tar.c b/archival/tar.c
+index 9de3759..cf8c2d1 100644
+--- a/archival/tar.c
++++ b/archival/tar.c
+@@ -475,7 +475,7 @@ static int FAST_FUNC writeFileToTarball(struct recursive_state *state,
+ DBG("writeFileToTarball('%s')", fileName);
+
+ /* Strip leading '/' and such (must be before memorizing hardlink's name) */
+- header_name = strip_unsafe_prefix(fileName);
++ header_name = skip_unsafe_prefix(fileName);
+
+ if (header_name[0] == '\0')
+ return TRUE;
+diff --git a/archival/unzip.c b/archival/unzip.c
+index 691a2d8..5844215 100644
+--- a/archival/unzip.c
++++ b/archival/unzip.c
+@@ -853,7 +853,7 @@ int unzip_main(int argc, char **argv)
+ unzip_skip(zip.fmt.extra_len);
+
+ /* Guard against "/abspath", "/../" and similar attacks */
+- overlapping_strcpy(dst_fn, strip_unsafe_prefix(dst_fn));
++ strip_unsafe_prefix(dst_fn);
+
+ /* Filter zip entries */
+ if (find_list_entry(zreject, dst_fn)
+diff --git a/include/bb_archive.h b/include/bb_archive.h
+index e0ef8fc..1dc77f3 100644
+--- a/include/bb_archive.h
++++ b/include/bb_archive.h
+@@ -202,7 +202,8 @@ char get_header_tar_xz(archive_handle_t *archive_handle) FAST_FUNC;
+ void seek_by_jump(int fd, off_t amount) FAST_FUNC;
+ void seek_by_read(int fd, off_t amount) FAST_FUNC;
+
+-const char *strip_unsafe_prefix(const char *str) FAST_FUNC;
++const char *skip_unsafe_prefix(const char *str) FAST_FUNC;
++void strip_unsafe_prefix(char *str) FAST_FUNC;
+ void create_or_remember_link(llist_t **link_placeholders,
+ const char *target,
+ const char *linkname,
+--
+2.50.1
+
diff --git a/meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-02.patch b/meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-02.patch
new file mode 100644
index 00000000000..00a276fa4f8
--- /dev/null
+++ b/meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-02.patch
@@ -0,0 +1,37 @@
+From 599f5dd8fac390c18b79cba4c14c334957605dae Mon Sep 17 00:00:00 2001
+From: Radoslav Kolev <radoslav.kolev@suse.com>
+Date: Mon, 16 Feb 2026 11:50:04 +0200
+Subject: [PATCH] tar: only strip unsafe components from hardlinks, not
+ symlinks
+
+commit 3fb6b31c7 introduced a check for unsafe components in
+tar archive hardlinks, but it was being applied to symlinks too
+which broke "Symlinks and hardlinks coexist" tar test.
+
+Signed-off-by: Radoslav Kolev <radoslav.kolev@suse.com>
+Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
+
+CVE: CVE-2026-26157, CVE-2026-26158
+Upstream-Status: Backport [https://git.busybox.net/busybox/commit/?id=599f5dd8fac390c18b79cba4c14c334957605dae]
+(Alternative mirrored URL: https://gogs.librecmc.org/OWEALS/busybox/commit/599f5dd8fac390c18b79cba4c14c334957605dae)
+Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
+---
+ archival/libarchive/get_header_tar.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/archival/libarchive/get_header_tar.c b/archival/libarchive/get_header_tar.c
+index 1c40ece..606d806 100644
+--- a/archival/libarchive/get_header_tar.c
++++ b/archival/libarchive/get_header_tar.c
+@@ -455,7 +455,7 @@ char FAST_FUNC get_header_tar(archive_handle_t *archive_handle)
+
+ /* Everything up to and including last ".." component is stripped */
+ strip_unsafe_prefix(file_header->name);
+- if (file_header->link_target) {
++ if (file_header->link_target && !S_ISLNK(file_header->mode)) {
+ /* GNU tar 1.34 examples:
+ * tar: Removing leading '/' from hard link targets
+ * tar: Removing leading '../' from hard link targets
+--
+2.50.1
+
diff --git a/meta/recipes-core/busybox/busybox_1.36.1.bb b/meta/recipes-core/busybox/busybox_1.36.1.bb
index d870e2ee10c..228bfdadd33 100644
--- a/meta/recipes-core/busybox/busybox_1.36.1.bb
+++ b/meta/recipes-core/busybox/busybox_1.36.1.bb
@@ -62,6 +62,8 @@ SRC_URI = "https://busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \
file://CVE-2025-46394-01.patch \
file://CVE-2025-46394-02.patch \
file://CVE-2025-60876.patch \
+ file://CVE-2026-26157-CVE-2026-26158-01.patch \
+ file://CVE-2026-26157-CVE-2026-26158-02.patch \
"
SRC_URI:append:libc-musl = " file://musl.cfg "
# TODO http://lists.busybox.net/pipermail/busybox/2023-January/090078.html
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 10/66] binutils: mark CVE-2025-69650 and CVE-2025-69651 as disputed
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (8 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 09/66] busybox: fix for CVE-2026-26157, CVE-2026-26158 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 11/66] vim: Fix CVE-2026-25749 Yoann Congal
` (55 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Adarsh Jagadish Kamini <adarsh.jagadish.kamini@est.tech>
Both CVEs are disputed by third parties. The observed behavior
(double free / invalid pointer free in readelf) only occurred in
pre-release code and did not affect any tagged version [1][2].
CVE_STATUS[CVE-2025-69650] = "disputed: observed behavior only in pre-release code, does not affect any tagged version"
CVE_STATUS[CVE-2025-69651] = "disputed: observed behavior only in pre-release code, does not affect any tagged version"
[1] https://www.cve.org/CVERecord?id=CVE-2025-69650
[2] https://www.cve.org/CVERecord?id=CVE-2025-69651
Signed-off-by: Adarsh Jagadish Kamini <adarsh.jagadish.kamini@est.tech>
(cherry picked from commit 9c6df56fe18237880c391798c2083dca595566f4)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-devtools/binutils/binutils-2.42.inc | 2 ++
1 file changed, 2 insertions(+)
diff --git a/meta/recipes-devtools/binutils/binutils-2.42.inc b/meta/recipes-devtools/binutils/binutils-2.42.inc
index 839d31242ef..e27502af72e 100644
--- a/meta/recipes-devtools/binutils/binutils-2.42.inc
+++ b/meta/recipes-devtools/binutils/binutils-2.42.inc
@@ -20,6 +20,8 @@ UPSTREAM_CHECK_GITTAGREGEX = "binutils-(?P<pver>\d+_(\d_?)*)"
CVE_STATUS[CVE-2023-25584] = "cpe-incorrect: Applies only for version 2.40 and earlier"
CVE_STATUS[CVE-2025-1180] = "patched: fixed by patch for CVE-2025-1176"
+CVE_STATUS[CVE-2025-69650] = "disputed: observed behavior only in pre-release code, does not affect any tagged version"
+CVE_STATUS[CVE-2025-69651] = "disputed: observed behavior only in pre-release code, does not affect any tagged version"
SRCREV ?= "f9488b0d92b591bdf3ff8cce485cb0e1b3727cc0"
BINUTILS_GIT_URI ?= "git://sourceware.org/git/binutils-gdb.git;branch=${SRCBRANCH};protocol=https"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 11/66] vim: Fix CVE-2026-25749
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (9 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 10/66] binutils: mark CVE-2025-69650 and CVE-2025-69651 as disputed Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 12/66] vim: Fix CVE-2026-26269 Yoann Congal
` (54 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Anil Dongare <adongare@cisco.com>
Pick patch from [1] also mentioned in [2]
[1] https://github.com/vim/vim/commit/0714b15940b245108e6e9d7aa2260dd849a26fa9
[2] https://nvd.nist.gov/vuln/detail/CVE-2026-25749
Signed-off-by: Anil Dongare <adongare@cisco.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../vim/files/CVE-2026-25749.patch | 64 +++++++++++++++++++
meta/recipes-support/vim/vim.inc | 1 +
2 files changed, 65 insertions(+)
create mode 100644 meta/recipes-support/vim/files/CVE-2026-25749.patch
diff --git a/meta/recipes-support/vim/files/CVE-2026-25749.patch b/meta/recipes-support/vim/files/CVE-2026-25749.patch
new file mode 100644
index 00000000000..8b04379b9b7
--- /dev/null
+++ b/meta/recipes-support/vim/files/CVE-2026-25749.patch
@@ -0,0 +1,64 @@
+From e0065a61a42bdff9c75aa18104f8ff546938395f Mon Sep 17 00:00:00 2001
+From: Christian Brabandt <cb@256bit.org>
+Date: Thu, 5 Feb 2026 18:51:54 +0000
+Subject: [PATCH] patch 9.1.2132: [security]: buffer-overflow in 'helpfile'
+ option handling
+
+Problem: [security]: buffer-overflow in 'helpfile' option handling by
+ using strcpy without bound checks (Rahul Hoysala)
+Solution: Limit strncpy to the length of the buffer (MAXPATHL)
+
+Github Advisory:
+https://github.com/vim/vim/security/advisories/GHSA-5w93-4g67-mm43
+
+CVE: CVE-2026-25749
+Upstream-Status: Backport [https://github.com/vim/vim/commit/0714b15940b245108e6e9d7aa2260dd849a26fa9]
+
+Backport Changes:
+- Excluded changes to src/version.c and runtime/doc/version9.txt
+ from this backport. This file only tracks upstream version increments.
+ We are applying a security fix, not a version upgrade. These changes
+ were skipped to maintain current package versioning and avoid merge conflicts.
+
+Signed-off-by: Christian Brabandt <cb@256bit.org>
+(cherry picked from commit 0714b15940b245108e6e9d7aa2260dd849a26fa9)
+Signed-off-by: Anil Dongare <adongare@cisco.com>
+---
+ src/tag.c | 2 +-
+ src/testdir/test_help.vim | 9 +++++++++
+ 2 files changed, 10 insertions(+), 1 deletion(-)
+
+diff --git a/src/tag.c b/src/tag.c
+index 6912e8743..a32bbb245 100644
+--- a/src/tag.c
++++ b/src/tag.c
+@@ -3348,7 +3348,7 @@ get_tagfname(
+ if (tnp->tn_hf_idx > tag_fnames.ga_len || *p_hf == NUL)
+ return FAIL;
+ ++tnp->tn_hf_idx;
+- STRCPY(buf, p_hf);
++ vim_strncpy(buf, p_hf, MAXPATHL - 1);
+ STRCPY(gettail(buf), "tags");
+ #ifdef BACKSLASH_IN_FILENAME
+ slash_adjust(buf);
+diff --git a/src/testdir/test_help.vim b/src/testdir/test_help.vim
+index dac153d86..f9e4686bb 100644
+--- a/src/testdir/test_help.vim
++++ b/src/testdir/test_help.vim
+@@ -222,4 +222,13 @@ func Test_helptag_navigation()
+ endfunc
+
+
++" This caused a buffer overflow
++func Test_helpfile_overflow()
++ let _helpfile = &helpfile
++ let &helpfile = repeat('A', 5000)
++ help
++ helpclose
++ let &helpfile = _helpfile
++endfunc
++
+ " vim: shiftwidth=2 sts=2 expandtab
+--
+2.43.7
+
diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc
index 289f31be707..ae1c95973dc 100644
--- a/meta/recipes-support/vim/vim.inc
+++ b/meta/recipes-support/vim/vim.inc
@@ -16,6 +16,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \
file://disable_acl_header_check.patch \
file://0001-src-Makefile-improve-reproducibility.patch \
file://no-path-adjust.patch \
+ file://CVE-2026-25749.patch \
"
PV .= ".1683"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 12/66] vim: Fix CVE-2026-26269
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (10 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 11/66] vim: Fix CVE-2026-25749 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 13/66] vim: Fix CVE-2026-33412 Yoann Congal
` (53 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Anil Dongare <adongare@cisco.com>
Pick patch from [1] also mentioned in [2]
[1] https://github.com/vim/vim/commit/c5f312aad8e4179e437f81ad39a860cd0ef11970
[2] https://nvd.nist.gov/vuln/detail/CVE-2026-26269
Signed-off-by: Anil Dongare <adongare@cisco.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../vim/files/CVE-2026-26269.patch | 150 ++++++++++++++++++
meta/recipes-support/vim/vim.inc | 1 +
2 files changed, 151 insertions(+)
create mode 100644 meta/recipes-support/vim/files/CVE-2026-26269.patch
diff --git a/meta/recipes-support/vim/files/CVE-2026-26269.patch b/meta/recipes-support/vim/files/CVE-2026-26269.patch
new file mode 100644
index 00000000000..1f9a72bca1d
--- /dev/null
+++ b/meta/recipes-support/vim/files/CVE-2026-26269.patch
@@ -0,0 +1,150 @@
+From 3cc246980b800454dda0603af410c77a8c1926e0 Mon Sep 17 00:00:00 2001
+From: Christian Brabandt <cb@256bit.org>
+Date: Fri, 13 Feb 2026 10:27:12 +0100
+Subject: [PATCH] patch 9.1.2148: [security]: Buffer overflow in netbeans
+ interface
+
+Problem: [security]: Buffer overflow in netbeans special_keys() handling
+Solution: Limit writing to max KEYBUFLEN bytes to prevent writing out of
+ bounds.
+
+Github Advisory:
+https://github.com/vim/vim/security/advisories/GHSA-9w5c-hwr9-hc68
+
+CVE: CVE-2026-26269
+Upstream-Status: Backport [https://github.com/vim/vim/commit/c5f312aad8e4179e437f81ad39a860cd0ef11970]
+
+Backport Changes:
+- Excluded changes to src/version.c from this backport. This file only tracks
+ upstream version increments. We are applying a security fix, not a version
+ upgrade. These changes were skipped to maintain current package versioning
+ and avoid merge conflicts.
+
+Signed-off-by: Christian Brabandt <cb@256bit.org>
+(cherry picked from commit c5f312aad8e4179e437f81ad39a860cd0ef11970)
+Signed-off-by: Anil Dongare <adongare@cisco.com>
+---
+ runtime/doc/version9.txt | 5 +++
+ src/netbeans.c | 2 +-
+ src/testdir/test_netbeans.py | 4 ++-
+ src/testdir/test_netbeans.vim | 57 +++++++++++++++++++++++++++++++++++
+ 4 files changed, 66 insertions(+), 2 deletions(-)
+
+diff --git a/runtime/doc/version9.txt b/runtime/doc/version9.txt
+index b82071757..b32400f17 100644
+--- a/runtime/doc/version9.txt
++++ b/runtime/doc/version9.txt
+@@ -41899,4 +41899,9 @@ features, but does not include runtime file changes (syntax, indent, ftplugin,
+ documentation, etc.)
+
+
++Patch 9.1.2148
++Problem: [security]: Buffer overflow in netbeans special_keys() handling
++Solution: Limit writing to max KEYBUFLEN bytes to prevent writing out of
++ bounds.
++
+ vim:tw=78:ts=8:noet:ft=help:norl:fdm=manual:nofoldenable
+diff --git a/src/netbeans.c b/src/netbeans.c
+index 4f5378512..8a341a20b 100644
+--- a/src/netbeans.c
++++ b/src/netbeans.c
+@@ -2302,7 +2302,7 @@ special_keys(char_u *args)
+ if ((sep = strchr(tok, '-')) != NULL)
+ {
+ *sep = NUL;
+- while (*tok)
++ while (*tok && i + 2 < KEYBUFLEN)
+ {
+ switch (*tok)
+ {
+diff --git a/src/testdir/test_netbeans.py b/src/testdir/test_netbeans.py
+index 0d6b09680..585886fb4 100644
+--- a/src/testdir/test_netbeans.py
++++ b/src/testdir/test_netbeans.py
+@@ -112,7 +112,9 @@ class ThreadedTCPRequestHandler(socketserver.BaseRequestHandler):
+ 'startAtomic_Test' : '0:startAtomic!94\n',
+ 'endAtomic_Test' : '0:endAtomic!95\n',
+ 'AnnoScale_Test' : "".join(['2:defineAnnoType!60 ' + str(i) + ' "s' + str(i) + '" "x" "=>" blue none\n' for i in range(2, 26)]),
+- 'detach_Test' : '2:close!96\n1:close!97\nDETACH\n'
++ 'detach_Test' : '2:close!96\n1:close!97\nDETACH\n',
++ 'specialKeys_overflow_Test' : '0:specialKeys!200 "' + 'A'*80 + '-X"\n'
++
+ }
+ # execute the specified test
+ if cmd not in testmap:
+diff --git a/src/testdir/test_netbeans.vim b/src/testdir/test_netbeans.vim
+index d3d5e8baf..d1be5066e 100644
+--- a/src/testdir/test_netbeans.vim
++++ b/src/testdir/test_netbeans.vim
+@@ -958,6 +958,58 @@ func Nb_bwipe_buffer(port)
+ sleep 10m
+ endfunc
+
++func Nb_specialKeys_overflow(port)
++ call delete("Xnetbeans")
++ call writefile([], "Xnetbeans")
++
++ " Last line number in the Xnetbeans file. Used to verify the result of the
++ " communication with the netbeans server
++ let g:last = 0
++
++ " Establish the connection with the netbeans server
++ exe 'nbstart :localhost:' .. a:port .. ':bunny'
++ call WaitFor('len(ReadXnetbeans()) > (g:last + 2)')
++ let l = ReadXnetbeans()
++ call assert_equal(['AUTH bunny',
++ \ '0:version=0 "2.5"',
++ \ '0:startupDone=0'], l[-3:])
++ let g:last += 3
++
++ " Open the command buffer to communicate with the server
++ split Xcmdbuf
++ let cmdbufnr = bufnr()
++ call WaitFor('len(ReadXnetbeans()) > (g:last + 2)')
++ let l = ReadXnetbeans()
++ call assert_equal('0:fileOpened=0 "Xcmdbuf" T F',
++ \ substitute(l[-3], '".*/', '"', ''))
++ call assert_equal('send: 1:putBufferNumber!15 "Xcmdbuf"',
++ \ substitute(l[-2], '".*/', '"', ''))
++ call assert_equal('1:startDocumentListen!16', l[-1])
++ let g:last += 3
++
++ " Keep the command buffer loaded for communication
++ hide
++
++ sleep 1m
++
++ " Open the command buffer to communicate with the server
++ split Xcmdbuf
++ let cmdbufnr = bufnr()
++ call appendbufline(cmdbufnr, '$', 'specialKeys_overflow_Test')
++ call WaitFor('len(ReadXnetbeans()) >= (g:last + 6)')
++ call WaitForAssert({-> assert_match('send: 0:specialKeys!200 "A\{80}-X"',
++ \ ReadXnetbeans()[-1])})
++
++ " Verify that specialKeys test, still works after the previous junk
++ call appendbufline(cmdbufnr, '$', 'specialKeys_Test')
++ call WaitFor('len(ReadXnetbeans()) >= (g:last + 1)')
++ call WaitForAssert({-> assert_match('^send: 0:specialKeys!91 "F12 F13 C-F13"$',
++ \ ReadXnetbeans()[-1])})
++ let g:last += 1
++
++ sleep 10m
++endfunc
++
+ " This test used to reference a buffer after it was freed leading to an ASAN
+ " error.
+ func Test_nb_bwipe_buffer()
+@@ -967,4 +1019,9 @@ func Test_nb_bwipe_buffer()
+ nbclose
+ endfunc
+
++" Verify that the specialKeys argument does not overflow
++func Test_nb_specialKeys_overflow()
++ call s:run_server('Nb_specialKeys_overflow')
++endfunc
++
+ " vim: shiftwidth=2 sts=2 expandtab
+--
+2.43.7
+
diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc
index ae1c95973dc..640aa2c9da1 100644
--- a/meta/recipes-support/vim/vim.inc
+++ b/meta/recipes-support/vim/vim.inc
@@ -17,6 +17,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \
file://0001-src-Makefile-improve-reproducibility.patch \
file://no-path-adjust.patch \
file://CVE-2026-25749.patch \
+ file://CVE-2026-26269.patch \
"
PV .= ".1683"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 13/66] vim: Fix CVE-2026-33412
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (11 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 12/66] vim: Fix CVE-2026-26269 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 14/66] sqlite3: Fix CVE-2025-70873 Yoann Congal
` (52 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Hitendra Prajapati <hprajapati@mvista.com>
Pick patch from [1] also mentioned in NVD report with [2]
[1] https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a
[2] https://nvd.nist.gov/vuln/detail/CVE-2026-33412
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../vim/files/CVE-2026-33412.patch | 61 +++++++++++++++++++
meta/recipes-support/vim/vim.inc | 1 +
2 files changed, 62 insertions(+)
create mode 100644 meta/recipes-support/vim/files/CVE-2026-33412.patch
diff --git a/meta/recipes-support/vim/files/CVE-2026-33412.patch b/meta/recipes-support/vim/files/CVE-2026-33412.patch
new file mode 100644
index 00000000000..62daa308b58
--- /dev/null
+++ b/meta/recipes-support/vim/files/CVE-2026-33412.patch
@@ -0,0 +1,61 @@
+From 645ed6597d1ea896c712cd7ddbb6edee79577e9a Mon Sep 17 00:00:00 2001
+From: pyllyukko <pyllyukko@maimed.org>
+Date: Thu, 19 Mar 2026 19:58:05 +0000
+Subject: [PATCH] patch 9.2.0202: [security]: command injection via newline in
+ glob()
+
+Problem: The glob() function on Unix-like systems does not escape
+ newline characters when expanding wildcards. A maliciously
+ crafted string containing '\n' can be used as a command
+ separator to execute arbitrary shell commands via
+ mch_expand_wildcards(). This depends on the user's 'shell'
+ setting.
+Solution: Add the newline character ('\n') to the SHELL_SPECIAL
+ definition to ensure it is properly escaped before being
+ passed to the shell (pyllyukko).
+
+closes: #19746
+
+Github Advisory:
+https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c
+
+Signed-off-by: pyllyukko <pyllyukko@maimed.org>
+Signed-off-by: Christian Brabandt <cb@256bit.org>
+
+CVE: CVE-2026-33412
+Upstream-Status: Backport [https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a]
+Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
+---
+ src/os_unix.c | 2 +-
+ src/version.c | 2 ++
+ 2 files changed, 3 insertions(+), 1 deletion(-)
+
+diff --git a/src/os_unix.c b/src/os_unix.c
+index cf195e62e1..d767956b1a 100644
+--- a/src/os_unix.c
++++ b/src/os_unix.c
+@@ -7106,7 +7106,7 @@ mch_expandpath(
+ # define SEEK_END 2
+ #endif
+
+-#define SHELL_SPECIAL (char_u *)"\t \"&'$;<>()\\|"
++# define SHELL_SPECIAL (char_u *)"\t \"&'$;<>()\\|\n"
+
+ int
+ mch_expand_wildcards(
+diff --git a/src/version.c b/src/version.c
+index 4f3912aedd..712a3e637c 100644
+--- a/src/version.c
++++ b/src/version.c
+@@ -724,6 +724,8 @@ static char *(features[]) =
+
+ static int included_patches[] =
+ { /* Add new patch number below this line */
++/**/
++ 1684,
+ /**/
+ 1683,
+ /**/
+--
+2.50.1
+
diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc
index 640aa2c9da1..4553c69c55f 100644
--- a/meta/recipes-support/vim/vim.inc
+++ b/meta/recipes-support/vim/vim.inc
@@ -18,6 +18,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \
file://no-path-adjust.patch \
file://CVE-2026-25749.patch \
file://CVE-2026-26269.patch \
+ file://CVE-2026-33412.patch \
"
PV .= ".1683"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 14/66] sqlite3: Fix CVE-2025-70873
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (12 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 13/66] vim: Fix CVE-2026-33412 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 15/66] unfs3: Fix race issue causing a glibc test hang Yoann Congal
` (51 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Pick patch as per [1]
[1] https://sqlite.org/src/info/3d459f1fb1bd1b5e
[2] https://sqlite.org/forum/forumpost/761eac3c82
[3] https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../sqlite/sqlite3/CVE-2025-70873.patch | 33 +++++++++++++++++++
meta/recipes-support/sqlite/sqlite3_3.45.3.bb | 1 +
2 files changed, 34 insertions(+)
create mode 100644 meta/recipes-support/sqlite/sqlite3/CVE-2025-70873.patch
diff --git a/meta/recipes-support/sqlite/sqlite3/CVE-2025-70873.patch b/meta/recipes-support/sqlite/sqlite3/CVE-2025-70873.patch
new file mode 100644
index 00000000000..2125110f6af
--- /dev/null
+++ b/meta/recipes-support/sqlite/sqlite3/CVE-2025-70873.patch
@@ -0,0 +1,33 @@
+From 5a05c59d4d75c03f23d5fb70feac9f789954bf8a Mon Sep 17 00:00:00 2001
+From: drh <>
+Date: Sat, 6 Dec 2025 20:41:24 +0000
+Subject: [PATCH] In the zipfile extension, only return as many bytes as
+ Inflate actually generated. [forum:/forumpost/761eac3c82|Forum post
+ 761eac3c82]. Adjust ./configure so that it builds zipfile into testfixture if
+ ZLIB is available, so that tests get run on unix platforms.
+
+FossilOrigin-Name: 3d459f1fb1bd1b5e723629c463ab392af7b206ece3388bda216c6a4c26160909
+
+Upstream-Status: Backport [https://github.com/sqlite/sqlite/commit/5a05c59d4d75c03f23d5fb70feac9f789954bf8a]
+CVE: CVE-2025-70873
+Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
+---
+ shell.c | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/shell.c b/shell.c
+index ecace5a..8c3740c 100644
+--- a/shell.c
++++ b/shell.c
+@@ -10277,7 +10277,7 @@ static void zipfileInflate(
+ if( err!=Z_STREAM_END ){
+ zipfileCtxErrorMsg(pCtx, "inflate() failed (%d)", err);
+ }else{
+- sqlite3_result_blob(pCtx, aRes, nOut, zipfileFree);
++ sqlite3_result_blob(pCtx, aRes, (int)str.total_out, zipfileFree);
+ aRes = 0;
+ }
+ }
+--
+2.43.0
+
diff --git a/meta/recipes-support/sqlite/sqlite3_3.45.3.bb b/meta/recipes-support/sqlite/sqlite3_3.45.3.bb
index 05bfaac1af9..1b3ac83b58d 100644
--- a/meta/recipes-support/sqlite/sqlite3_3.45.3.bb
+++ b/meta/recipes-support/sqlite/sqlite3_3.45.3.bb
@@ -8,6 +8,7 @@ SRC_URI = "http://www.sqlite.org/2024/sqlite-autoconf-${SQLITE_PV}.tar.gz \
file://CVE-2025-29088.patch \
file://CVE-2025-6965.patch \
file://CVE-2025-7709.patch \
+ file://CVE-2025-70873.patch \
"
SRC_URI[sha256sum] = "b2809ca53124c19c60f42bf627736eae011afdcc205bb48270a5ee9a38191531"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 15/66] unfs3: Fix race issue causing a glibc test hang
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (13 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 14/66] sqlite3: Fix CVE-2025-70873 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 16/66] nghttp2: Fix CVE-2026-27135 Yoann Congal
` (50 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Hemanth Kumar M D <Hemanth.KumarMD@windriver.com>
When running glibc tests under user mode NFS, tst-syslog was causing a hang. The
hang was traced to unfsd exitting with a buffer overflow being detected.
This was traced down to mksocket() where we'd see:
socket path '/media/build/poky/build/build-st-2118464/tmp/work/x86-64-v3-poky-linux/glibc-testsuite/2.42+git/build-x86_64-poky-linux/testroot.root/dev/log' is too long at 141 vs 108
There is a length check in mknod_args() but obj may not be setup at this point by
cat_name() since the functions can be executed out of order according to C.
To avoid this, make the order explict. This means the length is checked and we
avoid the buffer overflow. This will likely cause the glibc test to fail however
it won't hang, which is a win.
[YOCTO #16113]
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Hemanth Kumar M D <Hemanth.KumarMD@windriver.com>
(cherry picked from commit e51d5e19cb1ba1d5ad7442064b64821d178bc9ca)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../unfs3/unfs3/fixrace.patch | 38 +++++++++++++++++++
meta/recipes-devtools/unfs3/unfs3_git.bb | 1 +
2 files changed, 39 insertions(+)
create mode 100644 meta/recipes-devtools/unfs3/unfs3/fixrace.patch
diff --git a/meta/recipes-devtools/unfs3/unfs3/fixrace.patch b/meta/recipes-devtools/unfs3/unfs3/fixrace.patch
new file mode 100644
index 00000000000..ebdb0d79f57
--- /dev/null
+++ b/meta/recipes-devtools/unfs3/unfs3/fixrace.patch
@@ -0,0 +1,38 @@
+When running glibc tests under user mode NFS, tst-syslog was causing a hang. The
+hang was traced to unfsd exitting with a buffer overflow being detected.
+
+This was traced down to mksocket() where we'd see:
+
+socket path '/media/build/poky/build/build-st-2118464/tmp/work/x86-64-v3-poky-linux/glibc-testsuite/2.42+git/build-x86_64-poky-linux/testroot.root/dev/log' is too long at 141 vs 108
+
+There is a length check in mknod_args() but obj may not be setup at this point by
+cat_name() since the functions can be executed out of order according to C.
+
+To avoid this, make the order explict. This means the length is checked and we
+avoid the buffer overflow. This will likely cause the glibc test to fail however
+it won't hang, which is a win.
+
+Upstream-Status: Pending
+
+Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
+Signed-off-by: Hemanth Kumar M D <Hemanth.KumarMD@windriver.com>
+
+diff --git a/nfs.c b/nfs.c
+index 3e92f87..784089a 100644
+--- a/nfs.c
++++ b/nfs.c
+@@ -776,9 +776,11 @@ MKNOD3res *nfsproc3_mknod_3_svc(MKNOD3args * argp, struct svc_req * rqstp)
+
+ PREP(path, argp->where.dir);
+ pre = get_pre_cached();
+- result.status =
+- join3(cat_name(path, argp->where.name, obj),
+- mknod_args(argp->what, obj, &new_mode, &dev), exports_rw());
++ result.status = cat_name(path, argp->where.name, obj);
++ if (result.status == NFS3_OK)
++ result.status = mknod_args(argp->what, obj, &new_mode, &dev);
++ if (result.status == NFS3_OK)
++ result.status = exports_rw();
+
+ cluster_create(obj, rqstp, &result.status);
+
diff --git a/meta/recipes-devtools/unfs3/unfs3_git.bb b/meta/recipes-devtools/unfs3/unfs3_git.bb
index c5b7898b3c1..50d5cd272f0 100644
--- a/meta/recipes-devtools/unfs3/unfs3_git.bb
+++ b/meta/recipes-devtools/unfs3/unfs3_git.bb
@@ -18,6 +18,7 @@ SRC_URI = "git://github.com/unfs3/unfs3.git;protocol=https;branch=master \
file://0001-locate.c-Include-attr.h.patch \
file://0001-fix-building-on-macOS.patch \
file://0001-attr-fix-utime-for-symlink.patch \
+ file://fixrace.patch \
"
SRCREV = "c8f2d2cd4529955419bad0e163f88d47ff176b8d"
UPSTREAM_CHECK_GITTAGREGEX = "unfs3\-(?P<pver>\d+(\.\d+)+)"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 16/66] nghttp2: Fix CVE-2026-27135
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (14 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 15/66] unfs3: Fix race issue causing a glibc test hang Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 17/66] linux/generate-cve-exclusions: backport script from master branch Yoann Congal
` (49 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Anil Dongare <adongare@cisco.com>
Pick patch from [1] also mentioned in [2]
[1] https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1
[2] https://nvd.nist.gov/vuln/detail/CVE-2026-27135
Signed-off-by: Anil Dongare <adongare@cisco.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../nghttp2/nghttp2/CVE-2026-27135.patch | 110 ++++++++++++++++++
.../recipes-support/nghttp2/nghttp2_1.61.0.bb | 4 +-
2 files changed, 113 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-support/nghttp2/nghttp2/CVE-2026-27135.patch
diff --git a/meta/recipes-support/nghttp2/nghttp2/CVE-2026-27135.patch b/meta/recipes-support/nghttp2/nghttp2/CVE-2026-27135.patch
new file mode 100644
index 00000000000..c4977cded01
--- /dev/null
+++ b/meta/recipes-support/nghttp2/nghttp2/CVE-2026-27135.patch
@@ -0,0 +1,110 @@
+From f9812d447b14435de77751077ef48214ebf252ec Mon Sep 17 00:00:00 2001
+From: Tatsuhiro Tsujikawa <tatsuhiro.t@gmail.com>
+Date: Wed, 18 Feb 2026 18:04:30 +0900
+Subject: [PATCH] Fix missing iframe->state validations to avoid assertion
+ failure
+
+CVE: CVE-2026-27135
+Upstream-Status: Backport [https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1]
+
+(cherry picked from commit 5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1)
+Signed-off-by: Anil Dongare <adongare@cisco.com>
+---
+ lib/nghttp2_session.c | 32 ++++++++++++++++++++++++++++++++
+ 1 file changed, 32 insertions(+)
+
+diff --git a/lib/nghttp2_session.c b/lib/nghttp2_session.c
+index 004a4dff..54312588 100644
+--- a/lib/nghttp2_session.c
++++ b/lib/nghttp2_session.c
+@@ -6079,6 +6079,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,
+ return rv;
+ }
+
++ if (iframe->state == NGHTTP2_IB_IGN_ALL) {
++ return (nghttp2_ssize)inlen;
++ }
++
+ on_begin_frame_called = 1;
+
+ rv = session_process_headers_frame(session);
+@@ -6445,6 +6449,9 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,
+ if (nghttp2_is_fatal(rv)) {
+ return rv;
+ }
++ if (iframe->state == NGHTTP2_IB_IGN_ALL) {
++ return (nghttp2_ssize)inlen;
++ }
+ }
+ }
+
+@@ -6701,6 +6708,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,
+ return rv;
+ }
+
++ if (iframe->state == NGHTTP2_IB_IGN_ALL) {
++ return (nghttp2_ssize)inlen;
++ }
++
+ session_inbound_frame_reset(session);
+
+ break;
+@@ -7004,6 +7015,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,
+ if (nghttp2_is_fatal(rv)) {
+ return rv;
+ }
++
++ if (iframe->state == NGHTTP2_IB_IGN_ALL) {
++ return (nghttp2_ssize)inlen;
++ }
+ } else {
+ iframe->state = NGHTTP2_IB_IGN_HEADER_BLOCK;
+ }
+@@ -7169,6 +7184,11 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,
+ rv = session->callbacks.on_data_chunk_recv_callback(
+ session, iframe->frame.hd.flags, iframe->frame.hd.stream_id,
+ in - readlen, (size_t)data_readlen, session->user_data);
++
++ if (iframe->state == NGHTTP2_IB_IGN_ALL) {
++ return (nghttp2_ssize)inlen;
++ }
++
+ if (rv == NGHTTP2_ERR_PAUSE) {
+ return (nghttp2_ssize)(in - first);
+ }
+@@ -7256,6 +7276,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,
+ return rv;
+ }
+
++ if (iframe->state == NGHTTP2_IB_IGN_ALL) {
++ return (nghttp2_ssize)inlen;
++ }
++
+ if (rv != 0) {
+ busy = 1;
+
+@@ -7274,6 +7298,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,
+ return rv;
+ }
+
++ if (iframe->state == NGHTTP2_IB_IGN_ALL) {
++ return (nghttp2_ssize)inlen;
++ }
++
+ session_inbound_frame_reset(session);
+
+ break;
+@@ -7302,6 +7330,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,
+ return rv;
+ }
+
++ if (iframe->state == NGHTTP2_IB_IGN_ALL) {
++ return (nghttp2_ssize)inlen;
++ }
++
+ session_inbound_frame_reset(session);
+
+ break;
+--
+2.43.7
+
diff --git a/meta/recipes-support/nghttp2/nghttp2_1.61.0.bb b/meta/recipes-support/nghttp2/nghttp2_1.61.0.bb
index ad85576dcbc..ebba15db282 100644
--- a/meta/recipes-support/nghttp2/nghttp2_1.61.0.bb
+++ b/meta/recipes-support/nghttp2/nghttp2_1.61.0.bb
@@ -4,7 +4,9 @@ SECTION = "libs"
LICENSE = "MIT"
LIC_FILES_CHKSUM = "file://COPYING;md5=764abdf30b2eadd37ce47dcbce0ea1ec"
-SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/nghttp2-${PV}.tar.xz"
+SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/nghttp2-${PV}.tar.xz \
+ file://CVE-2026-27135.patch \
+ "
SRC_URI[sha256sum] = "c0e660175b9dc429f11d25b9507a834fb752eea9135ab420bb7cb7e9dbcc9654"
inherit cmake manpages python3native github-releases
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 17/66] linux/generate-cve-exclusions: backport script from master branch
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (15 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 16/66] nghttp2: Fix CVE-2026-27135 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 18/66] python3: upgrade 3.12.12 -> 3.12.13 Yoann Congal
` (48 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: João Marcos Costa (Schneider Electric) <joaomarcos.costa@bootlin.com>
The current version of this script in Scarthgap is outdated, since it
still uses data from linux_kernel_cves. This repository was archived in
2024.
To avoid any risks of conflicts, and/or a patch series longer than it
needs to be, I copied the generate-cve-exclusions.py script from
oe-core's master branch (rev. "e954a94b5b528b2430e8da331107d7d58287f89b") as-is.
Signed-off-by: João Marcos Costa (Schneider Electric) <joaomarcos.costa@bootlin.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../linux/generate-cve-exclusions.py | 122 +++++++++++++-----
1 file changed, 90 insertions(+), 32 deletions(-)
diff --git a/meta/recipes-kernel/linux/generate-cve-exclusions.py b/meta/recipes-kernel/linux/generate-cve-exclusions.py
index aa9195aab4f..5139b110558 100755
--- a/meta/recipes-kernel/linux/generate-cve-exclusions.py
+++ b/meta/recipes-kernel/linux/generate-cve-exclusions.py
@@ -1,7 +1,7 @@
#! /usr/bin/env python3
# Generate granular CVE status metadata for a specific version of the kernel
-# using data from linuxkernelcves.com.
+# using json data from cvelistV5 or vulns repository
#
# SPDX-License-Identifier: GPL-2.0-only
@@ -9,7 +9,9 @@ import argparse
import datetime
import json
import pathlib
-import re
+import os
+import glob
+import subprocess
from packaging.version import Version
@@ -25,26 +27,82 @@ def parse_version(s):
return Version(s)
return None
+def get_fixed_versions(cve_info, base_version):
+ '''
+ Get fixed versionss
+ '''
+ first_affected = None
+ fixed = None
+ fixed_backport = None
+ next_version = Version(str(base_version) + ".5000")
+ for affected in cve_info["containers"]["cna"]["affected"]:
+ # In case the CVE info is not complete, it might not have default status and therefore
+ # we don't know the status of this CVE.
+ if not "defaultStatus" in affected:
+ return first_affected, fixed, fixed_backport
+ if affected["defaultStatus"] == "affected":
+ for version in affected["versions"]:
+ v = Version(version["version"])
+ if v == Version('0'):
+ #Skiping non-affected
+ continue
+ if version["status"] == "unaffected" and first_affected and v < first_affected:
+ first_affected = Version(f"{v.major}.{v.minor}")
+ if version["status"] == "affected" and not first_affected:
+ first_affected = v
+ elif (version["status"] == "unaffected" and
+ version['versionType'] == "original_commit_for_fix"):
+ fixed = v
+ elif base_version < v and v < next_version:
+ fixed_backport = v
+ elif affected["defaultStatus"] == "unaffected":
+ # Only specific versions are affected. We care only about our base version
+ if "versions" not in affected:
+ continue
+ for version in affected["versions"]:
+ if "versionType" not in version:
+ continue
+ if version["versionType"] == "git":
+ continue
+ v = Version(version["version"])
+ # in case it is not in our base version
+ less_than = Version(version["lessThan"])
+
+ if not first_affected:
+ first_affected = v
+ fixed = less_than
+ if base_version < v and v < next_version:
+ fixed_backport = less_than
+
+ return first_affected, fixed, fixed_backport
+
+def is_linux_cve(cve_info):
+ '''Return true is the CVE belongs to Linux'''
+ if not "affected" in cve_info["containers"]["cna"]:
+ return False
+ for affected in cve_info["containers"]["cna"]["affected"]:
+ if not "product" in affected:
+ return False
+ if affected["product"] == "Linux" and affected["vendor"] == "Linux":
+ return True
+ return False
def main(argp=None):
parser = argparse.ArgumentParser()
- parser.add_argument("datadir", type=pathlib.Path, help="Path to a clone of https://github.com/nluedtke/linux_kernel_cves")
+ parser.add_argument("datadir", type=pathlib.Path, help="Path to a clone of https://github.com/CVEProject/cvelistV5 or https://git.kernel.org/pub/scm/linux/security/vulns.git")
parser.add_argument("version", type=Version, help="Kernel version number to generate data for, such as 6.1.38")
args = parser.parse_args(argp)
- datadir = args.datadir
+ datadir = args.datadir.resolve()
version = args.version
- base_version = f"{version.major}.{version.minor}"
+ base_version = Version(f"{version.major}.{version.minor}")
- with open(datadir / "data" / "kernel_cves.json", "r") as f:
- cve_data = json.load(f)
-
- with open(datadir / "data" / "stream_fixes.json", "r") as f:
- stream_data = json.load(f)
+ data_version = subprocess.check_output(("git", "describe", "--tags", "--always", "HEAD"), cwd=datadir, text=True)
print(f"""
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at {datetime.datetime.now(datetime.timezone.utc)} for version {version}
+# Generated at {datetime.datetime.now(datetime.timezone.utc)} for kernel version {version}
+# From {datadir.name} {data_version}
python check_kernel_cve_status_version() {{
this_version = "{version}"
@@ -55,17 +113,23 @@ python check_kernel_cve_status_version() {{
do_cve_check[prefuncs] += "check_kernel_cve_status_version"
""")
- for cve, data in cve_data.items():
- if "affected_versions" not in data:
- print(f"# Skipping {cve}, no affected_versions")
- print()
- continue
+ # Loop though all CVES and check if they are kernel related, newer than 2015
+ pattern = os.path.join(datadir, '**', "CVE-20*.json")
- affected = data["affected_versions"]
- first_affected, fixed = re.search(r"(.+) to (.+)", affected).groups()
- first_affected = parse_version(first_affected)
- fixed = parse_version(fixed)
+ files = glob.glob(pattern, recursive=True)
+ for cve_file in sorted(files):
+ # Get CVE Id
+ cve = cve_file[cve_file.rfind("/")+1:cve_file.rfind(".json")]
+ # We process from 2015 data, old request are not properly formated
+ year = cve.split("-")[1]
+ if int(year) < 2015:
+ continue
+ with open(cve_file, 'r', encoding='utf-8') as json_file:
+ cve_info = json.load(json_file)
+ if not is_linux_cve(cve_info):
+ continue
+ first_affected, fixed, backport_ver = get_fixed_versions(cve_info, base_version)
if not fixed:
print(f"# {cve} has no known resolution")
elif first_affected and version < first_affected:
@@ -75,19 +139,13 @@ do_cve_check[prefuncs] += "check_kernel_cve_status_version"
f'CVE_STATUS[{cve}] = "fixed-version: Fixed from version {fixed}"'
)
else:
- if cve in stream_data:
- backport_data = stream_data[cve]
- if base_version in backport_data:
- backport_ver = Version(backport_data[base_version]["fixed_version"])
- if backport_ver <= version:
- print(
- f'CVE_STATUS[{cve}] = "cpe-stable-backport: Backported in {backport_ver}"'
- )
- else:
- # TODO print a note that the kernel needs bumping
- print(f"# {cve} needs backporting (fixed from {backport_ver})")
+ if backport_ver:
+ if backport_ver <= version:
+ print(
+ f'CVE_STATUS[{cve}] = "cpe-stable-backport: Backported in {backport_ver}"'
+ )
else:
- print(f"# {cve} needs backporting (fixed from {fixed})")
+ print(f"# {cve} may need backporting (fixed from {backport_ver})")
else:
print(f"# {cve} needs backporting (fixed from {fixed})")
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 18/66] python3: upgrade 3.12.12 -> 3.12.13
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (16 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 17/66] linux/generate-cve-exclusions: backport script from master branch Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 19/66] vim: Fix CVE-2026-28418 Yoann Congal
` (47 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Vijay Anusuri <vanusuri@mvista.com>
Drop upstreamed patches.
Release information:
* https://www.python.org/downloads/release/python-31213/
* The release you're looking at is Python 3.12.13, a security bugfix
release for the legacy 3.12 series.
Handles CVE-2024-6923 CVE-2025-12084 CVE-2025-13836 CVE-2025-13837
CVE-2025-15282 CVE-2025-59375 CVE-2026-0865 CVE-2026-24515 CVE-2026-25210
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
[YC: Full changelog: https://docs.python.org/release/3.12.13/whatsnew/changelog.html#python-3-12-13]
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../python/python3/CVE-2025-12084.patch | 144 -------
.../python/python3/CVE-2025-13836.patch | 162 --------
.../python/python3/CVE-2025-13837.patch | 162 --------
.../python/python3/CVE-2025-6075.patch | 355 ------------------
...{python3_3.12.12.bb => python3_3.12.13.bb} | 6 +-
5 files changed, 1 insertion(+), 828 deletions(-)
delete mode 100644 meta/recipes-devtools/python/python3/CVE-2025-12084.patch
delete mode 100644 meta/recipes-devtools/python/python3/CVE-2025-13836.patch
delete mode 100644 meta/recipes-devtools/python/python3/CVE-2025-13837.patch
delete mode 100644 meta/recipes-devtools/python/python3/CVE-2025-6075.patch
rename meta/recipes-devtools/python/{python3_3.12.12.bb => python3_3.12.13.bb} (98%)
diff --git a/meta/recipes-devtools/python/python3/CVE-2025-12084.patch b/meta/recipes-devtools/python/python3/CVE-2025-12084.patch
deleted file mode 100644
index b7c0650cdc5..00000000000
--- a/meta/recipes-devtools/python/python3/CVE-2025-12084.patch
+++ /dev/null
@@ -1,144 +0,0 @@
-From 9c9dda6625a2a90d2a06c657eee021d6be19842d Mon Sep 17 00:00:00 2001
-From: "Miss Islington (bot)"
- <31488909+miss-islington@users.noreply.github.com>
-Date: Mon, 22 Dec 2025 14:48:49 +0100
-Subject: [PATCH] [3.12] gh-142145: Remove quadratic behavior in node ID cache
- clearing (GH-142146) (#142211)
-
-* gh-142145: Remove quadratic behavior in node ID cache clearing (GH-142146)
-* gh-142754: Ensure that Element & Attr instances have the ownerDocument attribute (GH-142794)
-(cherry picked from commit 1cc7551b3f9f71efbc88d96dce90f82de98b2454)
-(cherry picked from commit 08d8e18ad81cd45bc4a27d6da478b51ea49486e4)
-(cherry picked from commit 8d2d7bb2e754f8649a68ce4116271a4932f76907)
-
-Co-authored-by: Jacob Walls <38668450+jacobtylerwalls@users.noreply.github.com>
-Co-authored-by: Seth Michael Larson <seth@python.org>
-Co-authored-by: Petr Viktorin <encukou@gmail.com>
-Co-authored-by: Hugo van Kemenade <1324225+hugovk@users.noreply.github.com>
-Co-authored-by: Gregory P. Smith <68491+gpshead@users.noreply.github.com>
-Co-authored-by: Hugo van Kemenade <1324225+hugovk@users.noreply.github.com>
-Co-authored-by: Gregory P. Smith <68491+gpshead@users.noreply.github.com>
-Co-authored-by: Gregory P. Smith <greg@krypto.org>
-
-CVE: CVE-2025-12084
-Upstream-Status: Backport [https://github.com/python/cpython/commit/9c9dda6625a2a90d2a06c657eee021d6be19842d]
-Signed-off-by: Peter Marko <peter.marko@siemens.com>
----
- Lib/test/test_minidom.py | 33 ++++++++++++++++++-
- Lib/xml/dom/minidom.py | 11 ++-----
- ...-12-01-09-36-45.gh-issue-142145.tcAUhg.rst | 6 ++++
- 3 files changed, 41 insertions(+), 9 deletions(-)
- create mode 100644 Misc/NEWS.d/next/Security/2025-12-01-09-36-45.gh-issue-142145.tcAUhg.rst
-
-diff --git a/Lib/test/test_minidom.py b/Lib/test/test_minidom.py
-index 699265ccadc..ab4823c8315 100644
---- a/Lib/test/test_minidom.py
-+++ b/Lib/test/test_minidom.py
-@@ -2,13 +2,14 @@
-
- import copy
- import pickle
-+import time
- import io
- from test import support
- import unittest
-
- import xml.dom.minidom
-
--from xml.dom.minidom import parse, Attr, Node, Document, parseString
-+from xml.dom.minidom import parse, Attr, Node, Document, Element, parseString
- from xml.dom.minidom import getDOMImplementation
- from xml.parsers.expat import ExpatError
-
-@@ -176,6 +177,36 @@ class MinidomTest(unittest.TestCase):
- self.confirm(dom.documentElement.childNodes[-1].data == "Hello")
- dom.unlink()
-
-+ @support.requires_resource('cpu')
-+ def testAppendChildNoQuadraticComplexity(self):
-+ impl = getDOMImplementation()
-+
-+ newdoc = impl.createDocument(None, "some_tag", None)
-+ top_element = newdoc.documentElement
-+ children = [newdoc.createElement(f"child-{i}") for i in range(1, 2 ** 15 + 1)]
-+ element = top_element
-+
-+ start = time.monotonic()
-+ for child in children:
-+ element.appendChild(child)
-+ element = child
-+ end = time.monotonic()
-+
-+ # This example used to take at least 30 seconds.
-+ # Conservative assertion due to the wide variety of systems and
-+ # build configs timing based tests wind up run under.
-+ # A --with-address-sanitizer --with-pydebug build on a rpi5 still
-+ # completes this loop in <0.5 seconds.
-+ self.assertLess(end - start, 4)
-+
-+ def testSetAttributeNodeWithoutOwnerDocument(self):
-+ # regression test for gh-142754
-+ elem = Element("test")
-+ attr = Attr("id")
-+ attr.value = "test-id"
-+ elem.setAttributeNode(attr)
-+ self.assertEqual(elem.getAttribute("id"), "test-id")
-+
- def testAppendChildFragment(self):
- dom, orig, c1, c2, c3, frag = self._create_fragment_test_nodes()
- dom.documentElement.appendChild(frag)
-diff --git a/Lib/xml/dom/minidom.py b/Lib/xml/dom/minidom.py
-index ef8a159833b..cada981f39f 100644
---- a/Lib/xml/dom/minidom.py
-+++ b/Lib/xml/dom/minidom.py
-@@ -292,13 +292,6 @@ def _append_child(self, node):
- childNodes.append(node)
- node.parentNode = self
-
--def _in_document(node):
-- # return True iff node is part of a document tree
-- while node is not None:
-- if node.nodeType == Node.DOCUMENT_NODE:
-- return True
-- node = node.parentNode
-- return False
-
- def _write_data(writer, data):
- "Writes datachars to writer."
-@@ -355,6 +348,7 @@ class Attr(Node):
- def __init__(self, qName, namespaceURI=EMPTY_NAMESPACE, localName=None,
- prefix=None):
- self.ownerElement = None
-+ self.ownerDocument = None
- self._name = qName
- self.namespaceURI = namespaceURI
- self._prefix = prefix
-@@ -680,6 +674,7 @@ class Element(Node):
-
- def __init__(self, tagName, namespaceURI=EMPTY_NAMESPACE, prefix=None,
- localName=None):
-+ self.ownerDocument = None
- self.parentNode = None
- self.tagName = self.nodeName = tagName
- self.prefix = prefix
-@@ -1539,7 +1534,7 @@ def _clear_id_cache(node):
- if node.nodeType == Node.DOCUMENT_NODE:
- node._id_cache.clear()
- node._id_search_stack = None
-- elif _in_document(node):
-+ elif node.ownerDocument:
- node.ownerDocument._id_cache.clear()
- node.ownerDocument._id_search_stack= None
-
-diff --git a/Misc/NEWS.d/next/Security/2025-12-01-09-36-45.gh-issue-142145.tcAUhg.rst b/Misc/NEWS.d/next/Security/2025-12-01-09-36-45.gh-issue-142145.tcAUhg.rst
-new file mode 100644
-index 00000000000..05c7df35d14
---- /dev/null
-+++ b/Misc/NEWS.d/next/Security/2025-12-01-09-36-45.gh-issue-142145.tcAUhg.rst
-@@ -0,0 +1,6 @@
-+Remove quadratic behavior in ``xml.minidom`` node ID cache clearing. In order
-+to do this without breaking existing users, we also add the *ownerDocument*
-+attribute to :mod:`xml.dom.minidom` elements and attributes created by directly
-+instantiating the ``Element`` or ``Attr`` class. Note that this way of creating
-+nodes is not supported; creator functions like
-+:py:meth:`xml.dom.Document.documentElement` should be used instead.
diff --git a/meta/recipes-devtools/python/python3/CVE-2025-13836.patch b/meta/recipes-devtools/python/python3/CVE-2025-13836.patch
deleted file mode 100644
index b90fc5f0ec3..00000000000
--- a/meta/recipes-devtools/python/python3/CVE-2025-13836.patch
+++ /dev/null
@@ -1,162 +0,0 @@
-From 14b1fdb0a94b96f86fc7b86671ea9582b8676628 Mon Sep 17 00:00:00 2001
-From: "Miss Islington (bot)"
- <31488909+miss-islington@users.noreply.github.com>
-Date: Mon, 22 Dec 2025 14:50:18 +0100
-Subject: [PATCH] [3.12] gh-119451: Fix a potential denial of service in
- http.client (GH-119454) (#142140)
-
-gh-119451: Fix a potential denial of service in http.client (GH-119454)
-
-Reading the whole body of the HTTP response could cause OOM if
-the Content-Length value is too large even if the server does not send
-a large amount of data. Now the HTTP client reads large data by chunks,
-therefore the amount of consumed memory is proportional to the amount
-of sent data.
-(cherry picked from commit 5a4c4a033a4a54481be6870aa1896fad732555b5)
-
-Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
-
-CVE: CVE-2025-13836
-Upstream-Status: Backport [https://github.com/python/cpython/commit/14b1fdb0a94b96f86fc7b86671ea9582b8676628]
-Signed-off-by: Peter Marko <peter.marko@siemens.com>
----
- Lib/http/client.py | 28 ++++++--
- Lib/test/test_httplib.py | 66 +++++++++++++++++++
- ...-05-23-11-47-48.gh-issue-119451.qkJe9-.rst | 5 ++
- 3 files changed, 95 insertions(+), 4 deletions(-)
- create mode 100644 Misc/NEWS.d/next/Security/2024-05-23-11-47-48.gh-issue-119451.qkJe9-.rst
-
-diff --git a/Lib/http/client.py b/Lib/http/client.py
-index fb29923d942..70451d67d4c 100644
---- a/Lib/http/client.py
-+++ b/Lib/http/client.py
-@@ -111,6 +111,11 @@ responses = {v: v.phrase for v in http.HTTPStatus.__members__.values()}
- _MAXLINE = 65536
- _MAXHEADERS = 100
-
-+# Data larger than this will be read in chunks, to prevent extreme
-+# overallocation.
-+_MIN_READ_BUF_SIZE = 1 << 20
-+
-+
- # Header name/value ABNF (http://tools.ietf.org/html/rfc7230#section-3.2)
- #
- # VCHAR = %x21-7E
-@@ -639,10 +644,25 @@ class HTTPResponse(io.BufferedIOBase):
- reading. If the bytes are truly not available (due to EOF), then the
- IncompleteRead exception can be used to detect the problem.
- """
-- data = self.fp.read(amt)
-- if len(data) < amt:
-- raise IncompleteRead(data, amt-len(data))
-- return data
-+ cursize = min(amt, _MIN_READ_BUF_SIZE)
-+ data = self.fp.read(cursize)
-+ if len(data) >= amt:
-+ return data
-+ if len(data) < cursize:
-+ raise IncompleteRead(data, amt - len(data))
-+
-+ data = io.BytesIO(data)
-+ data.seek(0, 2)
-+ while True:
-+ # This is a geometric increase in read size (never more than
-+ # doubling out the current length of data per loop iteration).
-+ delta = min(cursize, amt - cursize)
-+ data.write(self.fp.read(delta))
-+ if data.tell() >= amt:
-+ return data.getvalue()
-+ cursize += delta
-+ if data.tell() < cursize:
-+ raise IncompleteRead(data.getvalue(), amt - data.tell())
-
- def _safe_readinto(self, b):
- """Same as _safe_read, but for reading into a buffer."""
-diff --git a/Lib/test/test_httplib.py b/Lib/test/test_httplib.py
-index 01f5a101901..e46dac00779 100644
---- a/Lib/test/test_httplib.py
-+++ b/Lib/test/test_httplib.py
-@@ -1452,6 +1452,72 @@ class BasicTest(TestCase):
- thread.join()
- self.assertEqual(result, b"proxied data\n")
-
-+ def test_large_content_length(self):
-+ serv = socket.create_server((HOST, 0))
-+ self.addCleanup(serv.close)
-+
-+ def run_server():
-+ [conn, address] = serv.accept()
-+ with conn:
-+ while conn.recv(1024):
-+ conn.sendall(
-+ b"HTTP/1.1 200 Ok\r\n"
-+ b"Content-Length: %d\r\n"
-+ b"\r\n" % size)
-+ conn.sendall(b'A' * (size//3))
-+ conn.sendall(b'B' * (size - size//3))
-+
-+ thread = threading.Thread(target=run_server)
-+ thread.start()
-+ self.addCleanup(thread.join, 1.0)
-+
-+ conn = client.HTTPConnection(*serv.getsockname())
-+ try:
-+ for w in range(15, 27):
-+ size = 1 << w
-+ conn.request("GET", "/")
-+ with conn.getresponse() as response:
-+ self.assertEqual(len(response.read()), size)
-+ finally:
-+ conn.close()
-+ thread.join(1.0)
-+
-+ def test_large_content_length_truncated(self):
-+ serv = socket.create_server((HOST, 0))
-+ self.addCleanup(serv.close)
-+
-+ def run_server():
-+ while True:
-+ [conn, address] = serv.accept()
-+ with conn:
-+ conn.recv(1024)
-+ if not size:
-+ break
-+ conn.sendall(
-+ b"HTTP/1.1 200 Ok\r\n"
-+ b"Content-Length: %d\r\n"
-+ b"\r\n"
-+ b"Text" % size)
-+
-+ thread = threading.Thread(target=run_server)
-+ thread.start()
-+ self.addCleanup(thread.join, 1.0)
-+
-+ conn = client.HTTPConnection(*serv.getsockname())
-+ try:
-+ for w in range(18, 65):
-+ size = 1 << w
-+ conn.request("GET", "/")
-+ with conn.getresponse() as response:
-+ self.assertRaises(client.IncompleteRead, response.read)
-+ conn.close()
-+ finally:
-+ conn.close()
-+ size = 0
-+ conn.request("GET", "/")
-+ conn.close()
-+ thread.join(1.0)
-+
- def test_putrequest_override_domain_validation(self):
- """
- It should be possible to override the default validation
-diff --git a/Misc/NEWS.d/next/Security/2024-05-23-11-47-48.gh-issue-119451.qkJe9-.rst b/Misc/NEWS.d/next/Security/2024-05-23-11-47-48.gh-issue-119451.qkJe9-.rst
-new file mode 100644
-index 00000000000..6d6f25cd2f8
---- /dev/null
-+++ b/Misc/NEWS.d/next/Security/2024-05-23-11-47-48.gh-issue-119451.qkJe9-.rst
-@@ -0,0 +1,5 @@
-+Fix a potential memory denial of service in the :mod:`http.client` module.
-+When connecting to a malicious server, it could cause
-+an arbitrary amount of memory to be allocated.
-+This could have led to symptoms including a :exc:`MemoryError`, swapping, out
-+of memory (OOM) killed processes or containers, or even system crashes.
diff --git a/meta/recipes-devtools/python/python3/CVE-2025-13837.patch b/meta/recipes-devtools/python/python3/CVE-2025-13837.patch
deleted file mode 100644
index 0f2e06a4912..00000000000
--- a/meta/recipes-devtools/python/python3/CVE-2025-13837.patch
+++ /dev/null
@@ -1,162 +0,0 @@
-From 5a8b19677d818fb41ee55f310233772e15aa1a2b Mon Sep 17 00:00:00 2001
-From: Serhiy Storchaka <storchaka@gmail.com>
-Date: Mon, 22 Dec 2025 15:49:44 +0200
-Subject: [PATCH] [3.12] gh-119342: Fix a potential denial of service in
- plistlib (GH-119343) (#142149)
-
-Reading a specially prepared small Plist file could cause OOM because file's
-read(n) preallocates a bytes object for reading the specified amount of
-data. Now plistlib reads large data by chunks, therefore the upper limit of
-consumed memory is proportional to the size of the input file.
-(cherry picked from commit 694922cf40aa3a28f898b5f5ee08b71b4922df70)
-
-CVE: CVE-2025-13837
-Upstream-Status: Backport [https://github.com/python/cpython/commit/5a8b19677d818fb41ee55f310233772e15aa1a2b]
-Signed-off-by: Peter Marko <peter.marko@siemens.com>
----
- Lib/plistlib.py | 31 ++++++++++------
- Lib/test/test_plistlib.py | 37 +++++++++++++++++--
- ...-05-21-22-11-31.gh-issue-119342.BTFj4Z.rst | 5 +++
- 3 files changed, 59 insertions(+), 14 deletions(-)
- create mode 100644 Misc/NEWS.d/next/Security/2024-05-21-22-11-31.gh-issue-119342.BTFj4Z.rst
-
-diff --git a/Lib/plistlib.py b/Lib/plistlib.py
-index 3292c30d5f..c5554ea1f7 100644
---- a/Lib/plistlib.py
-+++ b/Lib/plistlib.py
-@@ -73,6 +73,9 @@ from xml.parsers.expat import ParserCreate
- PlistFormat = enum.Enum('PlistFormat', 'FMT_XML FMT_BINARY', module=__name__)
- globals().update(PlistFormat.__members__)
-
-+# Data larger than this will be read in chunks, to prevent extreme
-+# overallocation.
-+_MIN_READ_BUF_SIZE = 1 << 20
-
- class UID:
- def __init__(self, data):
-@@ -499,12 +502,24 @@ class _BinaryPlistParser:
-
- return tokenL
-
-+ def _read(self, size):
-+ cursize = min(size, _MIN_READ_BUF_SIZE)
-+ data = self._fp.read(cursize)
-+ while True:
-+ if len(data) != cursize:
-+ raise InvalidFileException
-+ if cursize == size:
-+ return data
-+ delta = min(cursize, size - cursize)
-+ data += self._fp.read(delta)
-+ cursize += delta
-+
- def _read_ints(self, n, size):
-- data = self._fp.read(size * n)
-+ data = self._read(size * n)
- if size in _BINARY_FORMAT:
- return struct.unpack(f'>{n}{_BINARY_FORMAT[size]}', data)
- else:
-- if not size or len(data) != size * n:
-+ if not size:
- raise InvalidFileException()
- return tuple(int.from_bytes(data[i: i + size], 'big')
- for i in range(0, size * n, size))
-@@ -561,22 +576,16 @@ class _BinaryPlistParser:
-
- elif tokenH == 0x40: # data
- s = self._get_size(tokenL)
-- result = self._fp.read(s)
-- if len(result) != s:
-- raise InvalidFileException()
-+ result = self._read(s)
-
- elif tokenH == 0x50: # ascii string
- s = self._get_size(tokenL)
-- data = self._fp.read(s)
-- if len(data) != s:
-- raise InvalidFileException()
-+ data = self._read(s)
- result = data.decode('ascii')
-
- elif tokenH == 0x60: # unicode string
- s = self._get_size(tokenL) * 2
-- data = self._fp.read(s)
-- if len(data) != s:
-- raise InvalidFileException()
-+ data = self._read(s)
- result = data.decode('utf-16be')
-
- elif tokenH == 0x80: # UID
-diff --git a/Lib/test/test_plistlib.py b/Lib/test/test_plistlib.py
-index fa46050658..229a5a242e 100644
---- a/Lib/test/test_plistlib.py
-+++ b/Lib/test/test_plistlib.py
-@@ -841,8 +841,7 @@ class TestPlistlib(unittest.TestCase):
-
- class TestBinaryPlistlib(unittest.TestCase):
-
-- @staticmethod
-- def decode(*objects, offset_size=1, ref_size=1):
-+ def build(self, *objects, offset_size=1, ref_size=1):
- data = [b'bplist00']
- offset = 8
- offsets = []
-@@ -854,7 +853,11 @@ class TestBinaryPlistlib(unittest.TestCase):
- len(objects), 0, offset)
- data.extend(offsets)
- data.append(tail)
-- return plistlib.loads(b''.join(data), fmt=plistlib.FMT_BINARY)
-+ return b''.join(data)
-+
-+ def decode(self, *objects, offset_size=1, ref_size=1):
-+ data = self.build(*objects, offset_size=offset_size, ref_size=ref_size)
-+ return plistlib.loads(data, fmt=plistlib.FMT_BINARY)
-
- def test_nonstandard_refs_size(self):
- # Issue #21538: Refs and offsets are 24-bit integers
-@@ -963,6 +966,34 @@ class TestBinaryPlistlib(unittest.TestCase):
- with self.assertRaises(plistlib.InvalidFileException):
- plistlib.loads(b'bplist00' + data, fmt=plistlib.FMT_BINARY)
-
-+ def test_truncated_large_data(self):
-+ self.addCleanup(os_helper.unlink, os_helper.TESTFN)
-+ def check(data):
-+ with open(os_helper.TESTFN, 'wb') as f:
-+ f.write(data)
-+ # buffered file
-+ with open(os_helper.TESTFN, 'rb') as f:
-+ with self.assertRaises(plistlib.InvalidFileException):
-+ plistlib.load(f, fmt=plistlib.FMT_BINARY)
-+ # unbuffered file
-+ with open(os_helper.TESTFN, 'rb', buffering=0) as f:
-+ with self.assertRaises(plistlib.InvalidFileException):
-+ plistlib.load(f, fmt=plistlib.FMT_BINARY)
-+ for w in range(20, 64):
-+ s = 1 << w
-+ # data
-+ check(self.build(b'\x4f\x13' + s.to_bytes(8, 'big')))
-+ # ascii string
-+ check(self.build(b'\x5f\x13' + s.to_bytes(8, 'big')))
-+ # unicode string
-+ check(self.build(b'\x6f\x13' + s.to_bytes(8, 'big')))
-+ # array
-+ check(self.build(b'\xaf\x13' + s.to_bytes(8, 'big')))
-+ # dict
-+ check(self.build(b'\xdf\x13' + s.to_bytes(8, 'big')))
-+ # number of objects
-+ check(b'bplist00' + struct.pack('>6xBBQQQ', 1, 1, s, 0, 8))
-+
-
- class TestKeyedArchive(unittest.TestCase):
- def test_keyed_archive_data(self):
-diff --git a/Misc/NEWS.d/next/Security/2024-05-21-22-11-31.gh-issue-119342.BTFj4Z.rst b/Misc/NEWS.d/next/Security/2024-05-21-22-11-31.gh-issue-119342.BTFj4Z.rst
-new file mode 100644
-index 0000000000..04fd8faca4
---- /dev/null
-+++ b/Misc/NEWS.d/next/Security/2024-05-21-22-11-31.gh-issue-119342.BTFj4Z.rst
-@@ -0,0 +1,5 @@
-+Fix a potential memory denial of service in the :mod:`plistlib` module.
-+When reading a Plist file received from untrusted source, it could cause
-+an arbitrary amount of memory to be allocated.
-+This could have led to symptoms including a :exc:`MemoryError`, swapping, out
-+of memory (OOM) killed processes or containers, or even system crashes.
diff --git a/meta/recipes-devtools/python/python3/CVE-2025-6075.patch b/meta/recipes-devtools/python/python3/CVE-2025-6075.patch
deleted file mode 100644
index 346af4df948..00000000000
--- a/meta/recipes-devtools/python/python3/CVE-2025-6075.patch
+++ /dev/null
@@ -1,355 +0,0 @@
-From 9ab89c026aa9611c4b0b67c288b8303a480fe742 Mon Sep 17 00:00:00 2001
-From: Łukasz Langa <lukasz@langa.pl>
-Date: Fri, 31 Oct 2025 17:58:09 +0100
-Subject: [PATCH] gh-136065: Fix quadratic complexity in os.path.expandvars()
- (GH-134952) (GH-140845)
-
-(cherry picked from commit f029e8db626ddc6e3a3beea4eff511a71aaceb5c)
-
-Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
-Co-authored-by: Łukasz Langa <lukasz@langa.pl>
-
-CVE: CVE-2025-6075
-
-Upstream-Status: Backport [https://github.com/python/cpython/commit/9ab89c026aa9611c4b0b67c288b8303a480fe742]
-
-Signed-off-by: Praveen Kumar <praveen.kumar@windriver.com>
----
- Lib/ntpath.py | 126 ++++++------------
- Lib/posixpath.py | 43 +++---
- Lib/test/test_genericpath.py | 14 ++
- Lib/test/test_ntpath.py | 18 ++-
- ...-05-30-22-33-27.gh-issue-136065.bu337o.rst | 1 +
- 5 files changed, 92 insertions(+), 110 deletions(-)
- create mode 100644 Misc/NEWS.d/next/Security/2025-05-30-22-33-27.gh-issue-136065.bu337o.rst
-
-diff --git a/Lib/ntpath.py b/Lib/ntpath.py
-index 1bef630..393d358 100644
---- a/Lib/ntpath.py
-+++ b/Lib/ntpath.py
-@@ -409,17 +409,23 @@ def expanduser(path):
- # XXX With COMMAND.COM you can use any characters in a variable name,
- # XXX except '^|<>='.
-
-+_varpattern = r"'[^']*'?|%(%|[^%]*%?)|\$(\$|[-\w]+|\{[^}]*\}?)"
-+_varsub = None
-+_varsubb = None
-+
- def expandvars(path):
- """Expand shell variables of the forms $var, ${var} and %var%.
-
- Unknown variables are left unchanged."""
- path = os.fspath(path)
-+ global _varsub, _varsubb
- if isinstance(path, bytes):
- if b'$' not in path and b'%' not in path:
- return path
-- import string
-- varchars = bytes(string.ascii_letters + string.digits + '_-', 'ascii')
-- quote = b'\''
-+ if not _varsubb:
-+ import re
-+ _varsubb = re.compile(_varpattern.encode(), re.ASCII).sub
-+ sub = _varsubb
- percent = b'%'
- brace = b'{'
- rbrace = b'}'
-@@ -428,94 +434,44 @@ def expandvars(path):
- else:
- if '$' not in path and '%' not in path:
- return path
-- import string
-- varchars = string.ascii_letters + string.digits + '_-'
-- quote = '\''
-+ if not _varsub:
-+ import re
-+ _varsub = re.compile(_varpattern, re.ASCII).sub
-+ sub = _varsub
- percent = '%'
- brace = '{'
- rbrace = '}'
- dollar = '$'
- environ = os.environ
-- res = path[:0]
-- index = 0
-- pathlen = len(path)
-- while index < pathlen:
-- c = path[index:index+1]
-- if c == quote: # no expansion within single quotes
-- path = path[index + 1:]
-- pathlen = len(path)
-- try:
-- index = path.index(c)
-- res += c + path[:index + 1]
-- except ValueError:
-- res += c + path
-- index = pathlen - 1
-- elif c == percent: # variable or '%'
-- if path[index + 1:index + 2] == percent:
-- res += c
-- index += 1
-- else:
-- path = path[index+1:]
-- pathlen = len(path)
-- try:
-- index = path.index(percent)
-- except ValueError:
-- res += percent + path
-- index = pathlen - 1
-- else:
-- var = path[:index]
-- try:
-- if environ is None:
-- value = os.fsencode(os.environ[os.fsdecode(var)])
-- else:
-- value = environ[var]
-- except KeyError:
-- value = percent + var + percent
-- res += value
-- elif c == dollar: # variable or '$$'
-- if path[index + 1:index + 2] == dollar:
-- res += c
-- index += 1
-- elif path[index + 1:index + 2] == brace:
-- path = path[index+2:]
-- pathlen = len(path)
-- try:
-- index = path.index(rbrace)
-- except ValueError:
-- res += dollar + brace + path
-- index = pathlen - 1
-- else:
-- var = path[:index]
-- try:
-- if environ is None:
-- value = os.fsencode(os.environ[os.fsdecode(var)])
-- else:
-- value = environ[var]
-- except KeyError:
-- value = dollar + brace + var + rbrace
-- res += value
-- else:
-- var = path[:0]
-- index += 1
-- c = path[index:index + 1]
-- while c and c in varchars:
-- var += c
-- index += 1
-- c = path[index:index + 1]
-- try:
-- if environ is None:
-- value = os.fsencode(os.environ[os.fsdecode(var)])
-- else:
-- value = environ[var]
-- except KeyError:
-- value = dollar + var
-- res += value
-- if c:
-- index -= 1
-+
-+ def repl(m):
-+ lastindex = m.lastindex
-+ if lastindex is None:
-+ return m[0]
-+ name = m[lastindex]
-+ if lastindex == 1:
-+ if name == percent:
-+ return name
-+ if not name.endswith(percent):
-+ return m[0]
-+ name = name[:-1]
- else:
-- res += c
-- index += 1
-- return res
-+ if name == dollar:
-+ return name
-+ if name.startswith(brace):
-+ if not name.endswith(rbrace):
-+ return m[0]
-+ name = name[1:-1]
-+
-+ try:
-+ if environ is None:
-+ return os.fsencode(os.environ[os.fsdecode(name)])
-+ else:
-+ return environ[name]
-+ except KeyError:
-+ return m[0]
-+
-+ return sub(repl, path)
-
-
- # Normalize a path, e.g. A//B, A/./B and A/foo/../B all become A\B.
-diff --git a/Lib/posixpath.py b/Lib/posixpath.py
-index 90a6f54..6306f14 100644
---- a/Lib/posixpath.py
-+++ b/Lib/posixpath.py
-@@ -314,42 +314,41 @@ def expanduser(path):
- # This expands the forms $variable and ${variable} only.
- # Non-existent variables are left unchanged.
-
--_varprog = None
--_varprogb = None
-+_varpattern = r'\$(\w+|\{[^}]*\}?)'
-+_varsub = None
-+_varsubb = None
-
- def expandvars(path):
- """Expand shell variables of form $var and ${var}. Unknown variables
- are left unchanged."""
- path = os.fspath(path)
-- global _varprog, _varprogb
-+ global _varsub, _varsubb
- if isinstance(path, bytes):
- if b'$' not in path:
- return path
-- if not _varprogb:
-+ if not _varsubb:
- import re
-- _varprogb = re.compile(br'\$(\w+|\{[^}]*\})', re.ASCII)
-- search = _varprogb.search
-+ _varsubb = re.compile(_varpattern.encode(), re.ASCII).sub
-+ sub = _varsubb
- start = b'{'
- end = b'}'
- environ = getattr(os, 'environb', None)
- else:
- if '$' not in path:
- return path
-- if not _varprog:
-+ if not _varsub:
- import re
-- _varprog = re.compile(r'\$(\w+|\{[^}]*\})', re.ASCII)
-- search = _varprog.search
-+ _varsub = re.compile(_varpattern, re.ASCII).sub
-+ sub = _varsub
- start = '{'
- end = '}'
- environ = os.environ
-- i = 0
-- while True:
-- m = search(path, i)
-- if not m:
-- break
-- i, j = m.span(0)
-- name = m.group(1)
-- if name.startswith(start) and name.endswith(end):
-+
-+ def repl(m):
-+ name = m[1]
-+ if name.startswith(start):
-+ if not name.endswith(end):
-+ return m[0]
- name = name[1:-1]
- try:
- if environ is None:
-@@ -357,13 +356,11 @@ def expandvars(path):
- else:
- value = environ[name]
- except KeyError:
-- i = j
-+ return m[0]
- else:
-- tail = path[j:]
-- path = path[:i] + value
-- i = len(path)
-- path += tail
-- return path
-+ return value
-+
-+ return sub(repl, path)
-
-
- # Normalize a path, e.g. A//B, A/./B and A/foo/../B all become A/B.
-diff --git a/Lib/test/test_genericpath.py b/Lib/test/test_genericpath.py
-index 3eefb72..1cec587 100644
---- a/Lib/test/test_genericpath.py
-+++ b/Lib/test/test_genericpath.py
-@@ -7,6 +7,7 @@ import os
- import sys
- import unittest
- import warnings
-+from test import support
- from test.support import is_emscripten
- from test.support import os_helper
- from test.support import warnings_helper
-@@ -443,6 +444,19 @@ class CommonTest(GenericTest):
- os.fsencode('$bar%s bar' % nonascii))
- check(b'$spam}bar', os.fsencode('%s}bar' % nonascii))
-
-+ @support.requires_resource('cpu')
-+ def test_expandvars_large(self):
-+ expandvars = self.pathmodule.expandvars
-+ with os_helper.EnvironmentVarGuard() as env:
-+ env.clear()
-+ env["A"] = "B"
-+ n = 100_000
-+ self.assertEqual(expandvars('$A'*n), 'B'*n)
-+ self.assertEqual(expandvars('${A}'*n), 'B'*n)
-+ self.assertEqual(expandvars('$A!'*n), 'B!'*n)
-+ self.assertEqual(expandvars('${A}A'*n), 'BA'*n)
-+ self.assertEqual(expandvars('${'*10*n), '${'*10*n)
-+
- def test_abspath(self):
- self.assertIn("foo", self.pathmodule.abspath("foo"))
- with warnings.catch_warnings():
-diff --git a/Lib/test/test_ntpath.py b/Lib/test/test_ntpath.py
-index ced9dc4..f4d5063 100644
---- a/Lib/test/test_ntpath.py
-+++ b/Lib/test/test_ntpath.py
-@@ -7,6 +7,7 @@ import sys
- import unittest
- import warnings
- from ntpath import ALLOW_MISSING
-+from test import support
- from test.support import cpython_only, os_helper
- from test.support import TestFailed, is_emscripten
- from test.support.os_helper import FakePath
-@@ -58,7 +59,7 @@ def tester(fn, wantResult):
- fn = fn.replace("\\", "\\\\")
- gotResult = eval(fn)
- if wantResult != gotResult and _norm(wantResult) != _norm(gotResult):
-- raise TestFailed("%s should return: %s but returned: %s" \
-+ raise support.TestFailed("%s should return: %s but returned: %s" \
- %(str(fn), str(wantResult), str(gotResult)))
-
- # then with bytes
-@@ -74,7 +75,7 @@ def tester(fn, wantResult):
- warnings.simplefilter("ignore", DeprecationWarning)
- gotResult = eval(fn)
- if _norm(wantResult) != _norm(gotResult):
-- raise TestFailed("%s should return: %s but returned: %s" \
-+ raise support.TestFailed("%s should return: %s but returned: %s" \
- %(str(fn), str(wantResult), repr(gotResult)))
-
-
-@@ -882,6 +883,19 @@ class TestNtpath(NtpathTestCase):
- check('%spam%bar', '%sbar' % nonascii)
- check('%{}%bar'.format(nonascii), 'ham%sbar' % nonascii)
-
-+ @support.requires_resource('cpu')
-+ def test_expandvars_large(self):
-+ expandvars = ntpath.expandvars
-+ with os_helper.EnvironmentVarGuard() as env:
-+ env.clear()
-+ env["A"] = "B"
-+ n = 100_000
-+ self.assertEqual(expandvars('%A%'*n), 'B'*n)
-+ self.assertEqual(expandvars('%A%A'*n), 'BA'*n)
-+ self.assertEqual(expandvars("''"*n + '%%'), "''"*n + '%')
-+ self.assertEqual(expandvars("%%"*n), "%"*n)
-+ self.assertEqual(expandvars("$$"*n), "$"*n)
-+
- def test_expanduser(self):
- tester('ntpath.expanduser("test")', 'test')
-
-diff --git a/Misc/NEWS.d/next/Security/2025-05-30-22-33-27.gh-issue-136065.bu337o.rst b/Misc/NEWS.d/next/Security/2025-05-30-22-33-27.gh-issue-136065.bu337o.rst
-new file mode 100644
-index 0000000..1d152bb
---- /dev/null
-+++ b/Misc/NEWS.d/next/Security/2025-05-30-22-33-27.gh-issue-136065.bu337o.rst
-@@ -0,0 +1 @@
-+Fix quadratic complexity in :func:`os.path.expandvars`.
---
-2.40.0
diff --git a/meta/recipes-devtools/python/python3_3.12.12.bb b/meta/recipes-devtools/python/python3_3.12.13.bb
similarity index 98%
rename from meta/recipes-devtools/python/python3_3.12.12.bb
rename to meta/recipes-devtools/python/python3_3.12.13.bb
index ce2c830655d..5fa25235fe8 100644
--- a/meta/recipes-devtools/python/python3_3.12.12.bb
+++ b/meta/recipes-devtools/python/python3_3.12.13.bb
@@ -34,17 +34,13 @@ SRC_URI = "http://www.python.org/ftp/python/${PV}/Python-${PV}.tar.xz \
file://0001-test_deadlock-skip-problematic-test.patch \
file://0001-test_active_children-skip-problematic-test.patch \
file://0001-test_readline-skip-limited-history-test.patch \
- file://CVE-2025-6075.patch \
- file://CVE-2025-12084.patch \
- file://CVE-2025-13836.patch \
- file://CVE-2025-13837.patch \
"
SRC_URI:append:class-native = " \
file://0001-Lib-sysconfig.py-use-prefix-value-from-build-configu.patch \
"
-SRC_URI[sha256sum] = "fb85a13414b028c49ba18bbd523c2d055a30b56b18b92ce454ea2c51edc656c4"
+SRC_URI[sha256sum] = "c08bc65a81971c1dd5783182826503369466c7e67374d1646519adf05207b684"
# exclude pre-releases for both python 2.x and 3.x
UPSTREAM_CHECK_REGEX = "[Pp]ython-(?P<pver>\d+(\.\d+)+).tar"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 19/66] vim: Fix CVE-2026-28418
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (17 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 18/66] python3: upgrade 3.12.12 -> 3.12.13 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 20/66] vim: Fix CVE-2026-28419 Yoann Congal
` (46 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Hitendra Prajapati <hprajapati@mvista.com>
Pick patch from [1] also mentioned in [2]
[1] https://github.com/vim/vim/commit/f6a7f469a9c0d09e84cd6cb46c3a9e76f684da2d
[2] https://nvd.nist.gov/vuln/detail/CVE-2026-28418
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../vim/files/CVE-2026-28418.patch | 78 +++++++++++++++++++
meta/recipes-support/vim/vim.inc | 1 +
2 files changed, 79 insertions(+)
create mode 100644 meta/recipes-support/vim/files/CVE-2026-28418.patch
diff --git a/meta/recipes-support/vim/files/CVE-2026-28418.patch b/meta/recipes-support/vim/files/CVE-2026-28418.patch
new file mode 100644
index 00000000000..3a80ba77f7d
--- /dev/null
+++ b/meta/recipes-support/vim/files/CVE-2026-28418.patch
@@ -0,0 +1,78 @@
+From f6a7f469a9c0d09e84cd6cb46c3a9e76f684da2d Mon Sep 17 00:00:00 2001
+From: Christian Brabandt <cb@256bit.org>
+Date: Mon, 23 Feb 2026 18:30:11 +0000
+Subject: [PATCH] patch 9.2.0074: [security]: Crash with overlong emacs tag
+ file
+
+Problem: Crash with overlong emacs tag file, because of an OOB buffer
+ read (ehdgks0627, un3xploitable)
+Solution: Check for end of buffer and return early.
+
+Github Advisory:
+https://github.com/vim/vim/security/advisories/GHSA-h4mf-vg97-hj8j
+
+Signed-off-by: Christian Brabandt <cb@256bit.org>
+
+CVE: CVE-2026-28418
+Upstream-Status: Backport [https://github.com/vim/vim/commit/f6a7f469a9c0d09e84cd6cb46c3a9e76f684da2d]
+Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
+---
+ src/tag.c | 3 +++
+ src/testdir/test_taglist.vim | 15 +++++++++++++++
+ src/version.c | 2 ++
+ 3 files changed, 20 insertions(+)
+
+diff --git a/src/tag.c b/src/tag.c
+index a32bbb2459..45af67f20d 100644
+--- a/src/tag.c
++++ b/src/tag.c
+@@ -1902,6 +1902,9 @@ emacs_tags_new_filename(findtags_state_T *st)
+
+ for (p = st->ebuf; *p && *p != ','; p++)
+ ;
++ // invalid
++ if (*p == NUL)
++ return;
+ *p = NUL;
+
+ // check for an included tags file.
+diff --git a/src/testdir/test_taglist.vim b/src/testdir/test_taglist.vim
+index 5a946042be..506e64f7ae 100644
+--- a/src/testdir/test_taglist.vim
++++ b/src/testdir/test_taglist.vim
+@@ -301,4 +301,19 @@ func Test_tag_complete_with_overlong_line()
+ set tags&
+ endfunc
+
++" This used to crash Vim
++func Test_evil_emacs_tagfile()
++ CheckFeature emacs_tags
++ let longline = repeat('a', 515)
++ call writefile([
++ \ "\x0c",
++ \ longline
++ \ ], 'Xtags', 'D')
++ set tags=Xtags
++
++ call assert_fails(':tag a', 'E426:')
++
++ set tags&
++endfunc
++
+ " vim: shiftwidth=2 sts=2 expandtab
+diff --git a/src/version.c b/src/version.c
+index 712a3e637c..7d265ab641 100644
+--- a/src/version.c
++++ b/src/version.c
+@@ -724,6 +724,8 @@ static char *(features[]) =
+
+ static int included_patches[] =
+ { /* Add new patch number below this line */
++/**/
++ 1685,
+ /**/
+ 1684,
+ /**/
+--
+2.50.1
+
diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc
index 4553c69c55f..37534c696b1 100644
--- a/meta/recipes-support/vim/vim.inc
+++ b/meta/recipes-support/vim/vim.inc
@@ -19,6 +19,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \
file://CVE-2026-25749.patch \
file://CVE-2026-26269.patch \
file://CVE-2026-33412.patch \
+ file://CVE-2026-28418.patch \
"
PV .= ".1683"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 20/66] vim: Fix CVE-2026-28419
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (18 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 19/66] vim: Fix CVE-2026-28418 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 21/66] openssl: upgrade 3.5.5 -> 3.5.6 Yoann Congal
` (45 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Hitendra Prajapati <hprajapati@mvista.com>
Pick patch from [1] also mentioned in [2]
[1] https://github.com/vim/vim/commit/9b7dfa2948c9e1e5e32a5812812d580c7879f4a0
[2] https://nvd.nist.gov/vuln/detail/CVE-2026-28419
Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../vim/files/CVE-2026-28419.patch | 86 +++++++++++++++++++
meta/recipes-support/vim/vim.inc | 1 +
2 files changed, 87 insertions(+)
create mode 100644 meta/recipes-support/vim/files/CVE-2026-28419.patch
diff --git a/meta/recipes-support/vim/files/CVE-2026-28419.patch b/meta/recipes-support/vim/files/CVE-2026-28419.patch
new file mode 100644
index 00000000000..91100a7e91e
--- /dev/null
+++ b/meta/recipes-support/vim/files/CVE-2026-28419.patch
@@ -0,0 +1,86 @@
+From 9b7dfa2948c9e1e5e32a5812812d580c7879f4a0 Mon Sep 17 00:00:00 2001
+From: Christian Brabandt <cb@256bit.org>
+Date: Mon, 23 Feb 2026 19:35:25 +0000
+Subject: [PATCH] patch 9.2.0075: [security]: Buffer underflow with emacs tag
+ file
+
+Problem: When parsing a malformed Emacs-style tags file, a 1-byte
+ heap-buffer-underflow read occurs if the 0x7f delimiter
+ appears at the very beginning of a line. This happens
+ because the code attempts to scan backward for a tag
+ name from the delimiter without checking if space exists.
+ (ehdgks0627, un3xploitable)
+Solution: Add a check to ensure the delimiter (p_7f) is not at the
+ start of the buffer (lbuf) before attempting to isolate
+ the tag name.
+
+GitHub Advisory:
+https://github.com/vim/vim/security/advisories/GHSA-xcc8-r6c5-hvwv
+
+Signed-off-by: Christian Brabandt <cb@256bit.org>
+
+
+CVE: CVE-2026-28419
+Upstream-Status: Backport [https://github.com/vim/vim/commit/9b7dfa2948c9e1e5e32a5812812d580c7879f4a0]
+Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
+---
+ src/tag.c | 3 +++
+ src/testdir/test_taglist.vim | 16 ++++++++++++++++
+ src/version.c | 2 ++
+ 3 files changed, 21 insertions(+)
+
+diff --git a/src/tag.c b/src/tag.c
+index 45af67f20d..d3a73997bb 100644
+--- a/src/tag.c
++++ b/src/tag.c
+@@ -2023,6 +2023,9 @@ etag_fail:
+ }
+ else // second format: isolate tagname
+ {
++ if (p_7f == lbuf)
++ goto etag_fail;
++
+ // find end of tagname
+ for (p = p_7f - 1; !vim_iswordc(*p); --p)
+ if (p == lbuf)
+diff --git a/src/testdir/test_taglist.vim b/src/testdir/test_taglist.vim
+index 506e64f7ae..42ecc4b76e 100644
+--- a/src/testdir/test_taglist.vim
++++ b/src/testdir/test_taglist.vim
+@@ -316,4 +316,20 @@ func Test_evil_emacs_tagfile()
+ set tags&
+ endfunc
+
++" This used to crash Vim due to a heap-buffer-underflow
++func Test_emacs_tagfile_underflow()
++ CheckFeature emacs_tags
++ " The sequence from the crash artifact:
++ let lines = [
++ \ "\x0c\xff\xffT\x19\x8a",
++ \ "\x19\x19\x0dtags\x19\x19\x19\x00\xff\xff\xff",
++ \ "\x7f3\x0c"
++ \ ]
++ call writefile(lines, 'Xtags', 'D')
++ set tags=Xtags
++ call assert_fails(':tag a', 'E431:')
++
++ set tags&
++endfunc
++
+ " vim: shiftwidth=2 sts=2 expandtab
+diff --git a/src/version.c b/src/version.c
+index 7d265ab641..4f47ec2688 100644
+--- a/src/version.c
++++ b/src/version.c
+@@ -724,6 +724,8 @@ static char *(features[]) =
+
+ static int included_patches[] =
+ { /* Add new patch number below this line */
++/**/
++ 1686,
+ /**/
+ 1685,
+ /**/
+--
+2.50.1
+
diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc
index 37534c696b1..9456cf3e13c 100644
--- a/meta/recipes-support/vim/vim.inc
+++ b/meta/recipes-support/vim/vim.inc
@@ -20,6 +20,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \
file://CVE-2026-26269.patch \
file://CVE-2026-33412.patch \
file://CVE-2026-28418.patch \
+ file://CVE-2026-28419.patch \
"
PV .= ".1683"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 21/66] openssl: upgrade 3.5.5 -> 3.5.6
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (19 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 20/66] vim: Fix CVE-2026-28419 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 22/66] gi-docgen: fix CVE-2025-11687 Yoann Congal
` (44 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Peter Marko <peter.marko@siemens.com>
Release information [1]:
OpenSSL 3.5.6 is a security patch release. The most severe CVE fixed in this release is Medium.
This release incorporates the following bug fixes and mitigations:
* Fixed incorrect failure handling in RSA KEM RSASVE encapsulation. (CVE-2026-31790)
* Fixed loss of key agreement group tuple structure when the DEFAULT keyword is used in
the server-side configuration of the key-agreement group list. (CVE-2026-2673)
* Fixed potential use-after-free in DANE client code. (CVE-2026-28387)
* Fixed NULL pointer dereference when processing a delta CRL. (CVE-2026-28388)
* Fixed possible NULL dereference when processing CMS KeyAgreeRecipientInfo. (CVE-2026-28389)
* Fixed possible NULL dereference when processing CMS KeyTransportRecipientInfo. (CVE-2026-28390)
* Fixed heap buffer overflow in hexadecimal conversion. (CVE-2026-31789)
[1] https://github.com/openssl/openssl/blob/openssl-3.5/NEWS.md#major-changes-between-openssl-355-and-openssl-356-7-apr-2026
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit fc25ce383ddcb1185c193ff2b10f9116741eb316)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
...1-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch | 2 +-
.../openssl/{openssl_3.5.5.bb => openssl_3.5.6.bb} | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
rename meta/recipes-connectivity/openssl/{openssl_3.5.5.bb => openssl_3.5.6.bb} (99%)
diff --git a/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch b/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch
index dadc034c913..bfbfedbd67e 100644
--- a/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch
+++ b/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch
@@ -38,7 +38,7 @@ diff --git a/Configurations/unix-Makefile.tmpl b/Configurations/unix-Makefile.tm
index 09303c4..011bda1 100644
--- a/Configurations/unix-Makefile.tmpl
+++ b/Configurations/unix-Makefile.tmpl
-@@ -513,13 +513,27 @@ BIN_LDFLAGS={- join(' ', $target{bin_lflags} || (),
+@@ -514,13 +514,27 @@ BIN_LDFLAGS={- join(' ', $target{bin_lflags} || (),
'$(CNF_LDFLAGS)', '$(LDFLAGS)') -}
BIN_EX_LIBS=$(CNF_EX_LIBS) $(EX_LIBS)
diff --git a/meta/recipes-connectivity/openssl/openssl_3.5.5.bb b/meta/recipes-connectivity/openssl/openssl_3.5.6.bb
similarity index 99%
rename from meta/recipes-connectivity/openssl/openssl_3.5.5.bb
rename to meta/recipes-connectivity/openssl/openssl_3.5.6.bb
index 1321adda92a..3bf78eff5c2 100644
--- a/meta/recipes-connectivity/openssl/openssl_3.5.5.bb
+++ b/meta/recipes-connectivity/openssl/openssl_3.5.6.bb
@@ -19,7 +19,7 @@ SRC_URI:append:class-nativesdk = " \
file://environment.d-openssl.sh \
"
-SRC_URI[sha256sum] = "b28c91532a8b65a1f983b4c28b7488174e4a01008e29ce8e69bd789f28bc2a89"
+SRC_URI[sha256sum] = "deae7c80cba99c4b4f940ecadb3c3338b13cb77418409238e57d7f31f2a3b736"
inherit lib_package multilib_header multilib_script ptest perlnative manpages
MULTILIB_SCRIPTS = "${PN}-bin:${bindir}/c_rehash"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 22/66] gi-docgen: fix CVE-2025-11687
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (20 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 21/66] openssl: upgrade 3.5.5 -> 3.5.6 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 23/66] python3-pyasn1: fix CVE-2026-23490 Yoann Congal
` (43 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Zhang Peng <peng.zhang1.cn@windriver.com>
CVE-2025-11687:
A flaw was found in the gi-docgen. This vulnerability allows arbitrary JavaScript execution in the
context of the page — enabling DOM access, session cookie theft and other client-side attacks — via
a crafted URL that supplies a malicious value to the q GET parameter (reflected DOM XSS).
Reference:
[https://nvd.nist.gov/vuln/detail/CVE-2025-11687]
Upstream patch:
[https://gitlab.gnome.org/GNOME/gi-docgen/-/commit/c53d2640bfa5823bbdf33683d95c160267c0ec68]
Signed-off-by: Zhang Peng <peng.zhang1.cn@windriver.com>
Signed-off-by: Jinfeng Wang <jinfeng.wang.cn@windriver.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../gi-docgen/files/CVE-2025-11687.patch | 90 +++++++++++++++++++
.../gi-docgen/gi-docgen_2023.3.bb | 5 +-
2 files changed, 94 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-gnome/gi-docgen/files/CVE-2025-11687.patch
diff --git a/meta/recipes-gnome/gi-docgen/files/CVE-2025-11687.patch b/meta/recipes-gnome/gi-docgen/files/CVE-2025-11687.patch
new file mode 100644
index 00000000000..8a0c15e4a88
--- /dev/null
+++ b/meta/recipes-gnome/gi-docgen/files/CVE-2025-11687.patch
@@ -0,0 +1,90 @@
+From 0e97b155ff1b15bc3173118561316d8ea28ec9b7 Mon Sep 17 00:00:00 2001
+From: Emmanuele Bassi <ebassi@gnome.org>
+Date: Fri, 10 Oct 2025 17:06:22 +0100
+Subject: [PATCH] Make sure to escape query strings
+
+Unescaped query strings should not be passed to the HTML parser, to
+avoid unwanted execution of JavaScript.
+
+The query is shown in the header of the search results, so we can easily
+split the header from the results; then we use a plain text node to
+represent the query, and let the browser escape it.
+
+See: https://cheatsheetseries.owasp.org/cheatsheets/DOM_based_XSS_Prevention_Cheat_Sheet.html
+
+Fixes: #228
+
+CVE: CVE-2025-11687
+Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/gi-docgen/-/commit/c53d2640bfa5823bbdf33683d95c160267c0ec68]
+
+Signed-off-by: Zhang Peng <peng.zhang1.cn@windriver.com>
+---
+ gidocgen/templates/basic/search.js | 30 +++++++++++++++++++-----------
+ 1 file changed, 19 insertions(+), 11 deletions(-)
+
+diff --git a/gidocgen/templates/basic/search.js b/gidocgen/templates/basic/search.js
+index 29c204f..628f0a6 100644
+--- a/gidocgen/templates/basic/search.js
++++ b/gidocgen/templates/basic/search.js
+@@ -182,17 +182,24 @@ function hideSearchResults() {
+ }
+ }
+
+-function renderResults(query, results) {
+- let html = "";
++function createResultsTitle(query, n_results) {
++ // Ensure we're returning an escaped query string, to ensure we
++ // prevent XSS vulnerabilities
++ let h1 = document.createElement("h1");
++ let text = document.createTextNode("Results for “" + query + "” (" + n_results + ")");
++ h1.appendChild(text)
++ return h1;
++}
+
+- html += "<h1>Results for "" + query + "" (" + results.length + ")</h1>" +
+- "<div id=\"search-results\">"
++function createResultsContent(results) {
++ let search_results = document.createElement("div");
++ search_results.setAttribute("id", "search-results");
+
+ if (results.length === 0) {
+- html += "No results found.";
++ search_results.textContent = "No results found.";
+ }
+ else {
+- html += "<div class=\"results\"><dl>";
++ let html = "<div class=\"results\"><dl>";
+ results.forEach(function(item) {
+ html += "<dt class=\"result " + TYPE_CLASSES[item.type] + "\">" +
+ "<a href=\"" + item.href + "\">" + item.text + "</a>" +
+@@ -204,11 +211,11 @@ function renderResults(query, results) {
+ "<dd>" + item.summary + "</dd>";
+ });
+ html += "</dl></div>";
+- }
+
+- html += "</div>";
++ search_results.innerHTML = html;
++ }
+
+- return html;
++ return search_results;
+ }
+
+ function showResults(query, results) {
+@@ -218,9 +225,10 @@ function showResults(query, results) {
+ window.history.replaceState(refs.input.value, "", baseUrl + extra + window.location.hash);
+ }
+
+- window.title = "Results for: " + query;
++ window.title = "Results for “" + query + "” (" + results.length + ")";
+ window.scroll({ top: 0 })
+- refs.search.innerHTML = renderResults(query, results);
++ refs.search.appendChild(createResultsTitle(query, results.length));
++ refs.search.appendChild(createResultsContent(results));
+ showSearchResults(search);
+ }
+
+--
+2.50.0
+
diff --git a/meta/recipes-gnome/gi-docgen/gi-docgen_2023.3.bb b/meta/recipes-gnome/gi-docgen/gi-docgen_2023.3.bb
index 54d7ef75136..53641bcbe33 100644
--- a/meta/recipes-gnome/gi-docgen/gi-docgen_2023.3.bb
+++ b/meta/recipes-gnome/gi-docgen/gi-docgen_2023.3.bb
@@ -8,7 +8,10 @@ HOMEPAGE = "https://gnome.pages.gitlab.gnome.org/gi-docgen/"
LICENSE = "GPL-3.0-or-later & Apache-2.0"
LIC_FILES_CHKSUM = "file://gi-docgen.py;beginline=1;endline=5;md5=2dc0f1f01202478cfe813c0e7f80b326"
-SRC_URI = "git://gitlab.gnome.org/GNOME/gi-docgen.git;protocol=https;branch=main"
+SRC_URI = "\
+ git://gitlab.gnome.org/GNOME/gi-docgen.git;protocol=https;branch=main \
+ file://CVE-2025-11687.patch \
+ "
SRCREV = "96f2e9b93e1d8a5338eb05b87fd879856ab7b3cc"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 23/66] python3-pyasn1: fix CVE-2026-23490
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (21 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 22/66] gi-docgen: fix CVE-2025-11687 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 24/66] python3-wheel: fix CVE-2026-24049 Yoann Congal
` (42 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Jiaying Song <jiaying.song.cn@windriver.com>
pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a
Denial-of-Service issue has been found that leads to memory exhaustion
from malformed RELATIVE-OID with excessive continuation octets. This
vulnerability is fixed in 0.6.2.
References:
https://nvd.nist.gov/vuln/detail/CVE-2026-23490
Signed-off-by: Jiaying Song <jiaying.song.cn@windriver.com>
Signed-off-by: Jinfeng Wang <jinfeng.wang.cn@windriver.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../recipes-devtools/python/python-pyasn1.inc | 3 +-
.../python3-pyasn1/CVE-2026-23490.patch | 136 ++++++++++++++++++
2 files changed, 138 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-devtools/python/python3-pyasn1/CVE-2026-23490.patch
diff --git a/meta/recipes-devtools/python/python-pyasn1.inc b/meta/recipes-devtools/python/python-pyasn1.inc
index 530ff1c7c36..96b4a3b52a6 100644
--- a/meta/recipes-devtools/python/python-pyasn1.inc
+++ b/meta/recipes-devtools/python/python-pyasn1.inc
@@ -18,7 +18,8 @@ inherit ptest
SRC_URI += " \
file://run-ptest \
- "
+ file://CVE-2026-23490.patch \
+"
RDEPENDS:${PN}-ptest += " \
python3-pytest \
diff --git a/meta/recipes-devtools/python/python3-pyasn1/CVE-2026-23490.patch b/meta/recipes-devtools/python/python3-pyasn1/CVE-2026-23490.patch
new file mode 100644
index 00000000000..a79774003be
--- /dev/null
+++ b/meta/recipes-devtools/python/python3-pyasn1/CVE-2026-23490.patch
@@ -0,0 +1,136 @@
+From d98d7bc91864e1e368d4849c26568e33c0dd0e27 Mon Sep 17 00:00:00 2001
+From: Simon Pichugin <simon.pichugin@gmail.com>
+Date: Wed, 28 Jan 2026 16:31:29 +0800
+Subject: [PATCH] Merge commit from fork
+
+Add limit of 20 continuation octets per OID arc to prevent a potential
+memory exhaustion from excessive continuation bytes input.
+
+CVE: CVE-2026-23490
+
+Upstream-Status: Backport [https://github.com/pyasn1/pyasn1/commit/3908f14422]
+
+Signed-off-by: Jiaying Song <jiaying.song.cn@windriver.com>
+---
+ pyasn1/codec/ber/decoder.py | 13 ++++++-
+ tests/codec/ber/test_decoder.py | 65 +++++++++++++++++++++++++++++++++
+ 2 files changed, 77 insertions(+), 1 deletion(-)
+
+diff --git a/pyasn1/codec/ber/decoder.py b/pyasn1/codec/ber/decoder.py
+index 7cc863d..be8ba65 100644
+--- a/pyasn1/codec/ber/decoder.py
++++ b/pyasn1/codec/ber/decoder.py
+@@ -35,6 +35,10 @@ noValue = base.noValue
+
+ SubstrateUnderrunError = error.SubstrateUnderrunError
+
++# Maximum number of continuation octets (high-bit set) allowed per OID arc.
++# 20 octets allows up to 140-bit integers, supporting UUID-based OIDs
++MAX_OID_ARC_CONTINUATION_OCTETS = 20
++
+
+ class AbstractPayloadDecoder(object):
+ protoComponent = None
+@@ -431,7 +435,14 @@ class ObjectIdentifierPayloadDecoder(AbstractSimplePayloadDecoder):
+ # Construct subid from a number of octets
+ nextSubId = subId
+ subId = 0
++ continuationOctetCount = 0
+ while nextSubId >= 128:
++ continuationOctetCount += 1
++ if continuationOctetCount > MAX_OID_ARC_CONTINUATION_OCTETS:
++ raise error.PyAsn1Error(
++ 'OID arc exceeds maximum continuation octets limit (%d) '
++ 'at position %d' % (MAX_OID_ARC_CONTINUATION_OCTETS, index)
++ )
+ subId = (subId << 7) + (nextSubId & 0x7F)
+ if index >= substrateLen:
+ raise error.SubstrateUnderrunError(
+@@ -1872,7 +1883,7 @@ class StreamingDecoder(object):
+ :py:class:`~pyasn1.error.SubstrateUnderrunError` object indicating
+ insufficient BER/CER/DER serialization on input to fully recover ASN.1
+ objects from it.
+-
++
+ In the latter case the caller is advised to ensure some more data in
+ the input stream, then call the iterator again. The decoder will resume
+ the decoding process using the newly arrived data.
+diff --git a/tests/codec/ber/test_decoder.py b/tests/codec/ber/test_decoder.py
+index 3b97ce4..f033dfd 100644
+--- a/tests/codec/ber/test_decoder.py
++++ b/tests/codec/ber/test_decoder.py
+@@ -450,6 +450,71 @@ class ObjectIdentifierDecoderTestCase(BaseTestCase):
+ ints2octs((0x06, 0x13, 0x88, 0x37, 0x83, 0xC6, 0xDF, 0xD4, 0xCC, 0xB3, 0xFF, 0xFF, 0xFE, 0xF0, 0xB8, 0xD6, 0xB8, 0xCB, 0xE2, 0xB6, 0x47))
+ ) == ((2, 999, 18446744073709551535184467440737095), null)
+
++ def testExcessiveContinuationOctets(self):
++ """Test that OID arcs with excessive continuation octets are rejected."""
++ # Create a payload with 25 continuation octets (exceeds 20 limit)
++ # 0x81 bytes are continuation octets, 0x01 terminates
++ malicious_payload = bytes([0x06, 26]) + bytes([0x81] * 25) + bytes([0x01])
++ try:
++ decoder.decode(malicious_payload)
++ except error.PyAsn1Error:
++ pass
++ else:
++ assert 0, 'Excessive continuation octets tolerated'
++
++ def testMaxAllowedContinuationOctets(self):
++ """Test that OID arcs at the maximum continuation octets limit work."""
++ # Create a payload with exactly 20 continuation octets (at limit)
++ # This should succeed
++ payload = bytes([0x06, 21]) + bytes([0x81] * 20) + bytes([0x01])
++ try:
++ decoder.decode(payload)
++ except error.PyAsn1Error:
++ assert 0, 'Valid OID with 20 continuation octets rejected'
++
++ def testOneOverContinuationLimit(self):
++ """Test boundary: 21 continuation octets (one over limit) is rejected."""
++ payload = bytes([0x06, 22]) + bytes([0x81] * 21) + bytes([0x01])
++ try:
++ decoder.decode(payload)
++ except error.PyAsn1Error:
++ pass
++ else:
++ assert 0, '21 continuation octets tolerated (should be rejected)'
++
++ def testExcessiveContinuationInSecondArc(self):
++ """Test that limit applies to subsequent arcs, not just the first."""
++ # First arc: valid simple byte (0x55 = 85, decodes to arc 2.5)
++ # Second arc: excessive continuation octets
++ payload = bytes([0x06, 27]) + bytes([0x55]) + bytes([0x81] * 25) + bytes([0x01])
++ try:
++ decoder.decode(payload)
++ except error.PyAsn1Error:
++ pass
++ else:
++ assert 0, 'Excessive continuation in second arc tolerated'
++
++ def testMultipleArcsAtLimit(self):
++ """Test multiple arcs each at the continuation limit work correctly."""
++ # Two arcs, each with 20 continuation octets (both at limit)
++ arc1 = bytes([0x81] * 20) + bytes([0x01]) # 21 bytes
++ arc2 = bytes([0x81] * 20) + bytes([0x01]) # 21 bytes
++ payload = bytes([0x06, 42]) + arc1 + arc2
++ try:
++ decoder.decode(payload)
++ except error.PyAsn1Error:
++ assert 0, 'Multiple valid arcs at limit rejected'
++
++ def testExcessiveContinuationWithMaxBytes(self):
++ """Test with 0xFF continuation bytes (maximum value, not just 0x81)."""
++ # 0xFF bytes are also continuation octets (high bit set)
++ malicious_payload = bytes([0x06, 26]) + bytes([0xFF] * 25) + bytes([0x01])
++ try:
++ decoder.decode(malicious_payload)
++ except error.PyAsn1Error:
++ pass
++ else:
++ assert 0, 'Excessive 0xFF continuation octets tolerated'
+
+ class RealDecoderTestCase(BaseTestCase):
+ def testChar(self):
+--
+2.34.1
+
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 24/66] python3-wheel: fix CVE-2026-24049
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (22 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 23/66] python3-pyasn1: fix CVE-2026-23490 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 25/66] gnupg: fix CVE-2026-24882 Yoann Congal
` (41 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Guocai He <guocai.he.cn@windriver.com>
Backport patch to fix CVE-2026-24049 per reference [1] [2].
[1] https://security-tracker.debian.org/tracker/CVE-2026-24049
[2] https://github.com/pypa/wheel/commit/7a7d2de96b
Signed-off-by: Guocai He <guocai.he.cn@windriver.com>
Signed-off-by: Jinfeng Wang <jinfeng.wang.cn@windriver.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../python/python3-wheel/CVE-2026-24049.patch | 73 +++++++++++++++++++
.../python/python3-wheel_0.42.0.bb | 2 +
2 files changed, 75 insertions(+)
create mode 100644 meta/recipes-devtools/python/python3-wheel/CVE-2026-24049.patch
diff --git a/meta/recipes-devtools/python/python3-wheel/CVE-2026-24049.patch b/meta/recipes-devtools/python/python3-wheel/CVE-2026-24049.patch
new file mode 100644
index 00000000000..89a848c1007
--- /dev/null
+++ b/meta/recipes-devtools/python/python3-wheel/CVE-2026-24049.patch
@@ -0,0 +1,73 @@
+From 363aef740d670c37d76b6fd86e2a28886de23f45 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Alex=20Gr=C3=B6nholm?= <alex.gronholm@nextday.fi>
+Date: Thu, 22 Jan 2026 01:41:14 +0200
+Subject: [PATCH] Fixed security issue around wheel unpack (#675)
+
+A maliciously crafted wheel could cause the permissions of a file outside the unpack tree to be altered.
+
+Fixes CVE-2026-24049.
+
+CVE: CVE-2026-24049
+
+In test case, the API "run_command" is not defined and use "unpack" directly.
+
+Upstream-Status: Backport [https://github.com/pypa/wheel/commit/7a7d2de96b]
+
+Signed-off-by: Guocai He <guocai.he.cn@windriver.com>
+---
+ src/wheel/cli/unpack.py | 4 ++--
+ tests/cli/test_unpack.py | 22 ++++++++++++++++++++++
+ 2 files changed, 24 insertions(+), 2 deletions(-)
+
+diff --git a/src/wheel/cli/unpack.py b/src/wheel/cli/unpack.py
+index d48840e..83dc742 100644
+--- a/src/wheel/cli/unpack.py
++++ b/src/wheel/cli/unpack.py
+@@ -19,12 +19,12 @@ def unpack(path: str, dest: str = ".") -> None:
+ destination = Path(dest) / namever
+ print(f"Unpacking to: {destination}...", end="", flush=True)
+ for zinfo in wf.filelist:
+- wf.extract(zinfo, destination)
++ target_path = Path(wf.extract(zinfo, destination))
+
+ # Set permissions to the same values as they were set in the archive
+ # We have to do this manually due to
+ # https://github.com/python/cpython/issues/59999
+ permissions = zinfo.external_attr >> 16 & 0o777
+- destination.joinpath(zinfo.filename).chmod(permissions)
++ target_path.chmod(permissions)
+
+ print("OK")
+diff --git a/tests/cli/test_unpack.py b/tests/cli/test_unpack.py
+index ae584af..96d1391 100644
+--- a/tests/cli/test_unpack.py
++++ b/tests/cli/test_unpack.py
+@@ -34,3 +34,25 @@ def test_unpack_executable_bit(tmp_path):
+ unpack(str(wheel_path), str(tmp_path))
+ assert not script_path.is_dir()
+ assert stat.S_IMODE(script_path.stat().st_mode) == 0o755
++
++@pytest.mark.skipif(
++ platform.system() == "Windows", reason="Windows does not support chmod()"
++)
++def test_chmod_outside_unpack_tree(tmp_path_factory: TempPathFactory) -> None:
++ wheel_path = tmp_path_factory.mktemp("build") / "test-1.0-py3-none-any.whl"
++ with WheelFile(wheel_path, "w") as wf:
++ wf.writestr(
++ "test-1.0.dist-info/METADATA",
++ "Metadata-Version: 2.4\nName: test\nVersion: 1.0\n",
++ )
++ wf.writestr("../../system-file", b"malicious data")
++
++ extract_root_path = tmp_path_factory.mktemp("extract")
++ system_file = extract_root_path / "system-file"
++ extract_path = extract_root_path / "subdir"
++ system_file.write_bytes(b"important data")
++ system_file.chmod(0o755)
++ unpack(str(wheel_path), str(extract_path))
++
++ assert system_file.read_bytes() == b"important data"
++ assert stat.S_IMODE(system_file.stat().st_mode) == 0o755
+--
+2.34.1
+
diff --git a/meta/recipes-devtools/python/python3-wheel_0.42.0.bb b/meta/recipes-devtools/python/python3-wheel_0.42.0.bb
index 807888e6c00..934f258a93d 100644
--- a/meta/recipes-devtools/python/python3-wheel_0.42.0.bb
+++ b/meta/recipes-devtools/python/python3-wheel_0.42.0.bb
@@ -8,6 +8,8 @@ SRC_URI[sha256sum] = "c45be39f7882c9d34243236f2d63cbd58039e360f85d0913425fbd7cee
inherit python_flit_core pypi
+SRC_URI += "file://CVE-2026-24049.patch"
+
BBCLASSEXTEND = "native nativesdk"
# This used to use the bootstrap install which didn't compile. Until we bump the
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 25/66] gnupg: fix CVE-2026-24882
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (23 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 24/66] python3-wheel: fix CVE-2026-24049 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 26/66] libxml2: Fix CVE-2026-1757 Yoann Congal
` (40 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Guocai He <guocai.he.cn@windriver.com>
Backport patch to fix CVE-2026-24882 per reference [1] [2].
[1] https://security-tracker.debian.org/tracker/CVE-2026-24882
[2] https://dev.gnupg.org/T8045
Signed-off-by: Guocai He <guocai.he.cn@windriver.com>
Signed-off-by: Jinfeng Wang <jinfeng.wang.cn@windriver.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../gnupg/gnupg/CVE-2026-24882-0001.patch | 70 +++++++++++++++++++
.../gnupg/gnupg/CVE-2026-24882-0002.patch | 47 +++++++++++++
meta/recipes-support/gnupg/gnupg_2.4.8.bb | 2 +
3 files changed, 119 insertions(+)
create mode 100644 meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0001.patch
create mode 100644 meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0002.patch
diff --git a/meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0001.patch b/meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0001.patch
new file mode 100644
index 00000000000..6e6d44c3729
--- /dev/null
+++ b/meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0001.patch
@@ -0,0 +1,70 @@
+From d07e2f19134129d59014fe181642cd122dc2e29f Mon Sep 17 00:00:00 2001
+From: Werner Koch <wk@gnupg.org>
+Date: Mon, 26 Jan 2026 11:13:44 +0100
+Subject: [PATCH 1/2] tpm: Fix possible buffer overflow in PKDECRYPT
+
+* tpm2d/tpm2.c (tpm2_ecc_decrypt): Bail out on too long CIPHERTEXT.
+(tpm2_rsa_decrypt): Ditto.
+--
+
+Cherry pick master commit of:
+ 93fa34d9a346020355cd51d54102d30d4f177323
+
+GnuPG-bug-id: 8045
+Co-authored-by: NIIBE Yutaka <gniibe@fsij.org>
+Reported-by: OpenAI Security Research
+
+CVE: CVE-2026-24882
+Upstream-Status: Backport [https://github.com/gpg/gnupg/commit/01c130031]
+
+Signed-off-by: Guocai He <guocai.he.cn@windriver.com>
+---
+ tpm2d/tpm2.c | 22 +++++++++++++++++++++-
+ 1 file changed, 21 insertions(+), 1 deletion(-)
+
+diff --git a/tpm2d/tpm2.c b/tpm2d/tpm2.c
+index 3e908dd..cd0347c 100644
+--- a/tpm2d/tpm2.c
++++ b/tpm2d/tpm2.c
+@@ -917,10 +917,20 @@ tpm2_ecc_decrypt (ctrl_t ctrl, TSS_CONTEXT *tssc, TPM_HANDLE key,
+ size_t len;
+ int ret;
+
++#if defined(TPM2_MAX_ECC_KEY_BYTES) /* Intel stack */
++ if (ciphertext_len > 2*TPM2_MAX_ECC_KEY_BYTES + 1)
++ return GPG_ERR_TOO_LARGE;
++#elif defined(MAX_ECC_KEY_BYTES) /* IBM stack */
++ if (ciphertext_len > 2*MAX_ECC_KEY_BYTES + 1)
++ return GPG_ERR_TOO_LARGE;
++#else
++# error TMP2 header are not correctly installed
++#endif
++
+ /* This isn't really a decryption per se. The ciphertext actually
+ * contains an EC Point which we must multiply by the private key number.
+ *
+- * The reason is to generate a diffe helman agreement on a shared
++ * The reason is to generate a diffie-hellman agreement on a shared
+ * point. This shared point is then used to generate the per
+ * session encryption key.
+ */
+@@ -976,6 +986,16 @@ tpm2_rsa_decrypt (ctrl_t ctrl, TSS_CONTEXT *tssc, TPM_HANDLE key,
+ TPM_HANDLE ah;
+ char *auth;
+
++#if defined(TPM2_MAX_RSA_KEY_BYTES) /* Intel stack */
++ if (ciphertext_len > TPM2_MAX_RSA_KEY_BYTES)
++ return GPG_ERR_TOO_LARGE;
++#elif defined(MAX_RSA_KEY_BYTES) /* IBM stack */
++ if (ciphertext_len > MAX_RSA_KEY_BYTES)
++ return GPG_ERR_TOO_LARGE;
++#else
++# error TMP2 header are not correctly installed
++#endif
++
+ inScheme.scheme = TPM_ALG_RSAES;
+ /*
+ * apparent gcrypt error: occasionally rsa ciphertext will
+--
+2.34.1
+
diff --git a/meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0002.patch b/meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0002.patch
new file mode 100644
index 00000000000..2e872ea491f
--- /dev/null
+++ b/meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0002.patch
@@ -0,0 +1,47 @@
+From e8eaa9bf018d3276d613f371207c91c1ffa3e16c Mon Sep 17 00:00:00 2001
+From: NIIBE Yutaka <gniibe@fsij.org>
+Date: Thu, 12 Feb 2026 11:51:17 +0900
+Subject: [PATCH 2/2] agent: Fix the regression in pkdecrypt with TPM RSA.
+
+* agent/divert-tpm2.c (divert_tpm2_pkdecrypt): Care about additional
+0x00.
+
+--
+
+Cherry pick master commit of:
+ 6eed3959303c81c9699fe9273030e480732f72be
+
+GnuPG-bug-id: 8045
+Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
+
+CVE: CVE-2026-24882
+Upstream-Status: Backport [https://github.com/gpg/gnupg/commit/555a9f5b3]
+
+Signed-off-by: Guocai He <guocai.he.cn@windriver.com>
+---
+ agent/divert-tpm2.c | 9 +++++++++
+ 1 file changed, 9 insertions(+)
+
+diff --git a/agent/divert-tpm2.c b/agent/divert-tpm2.c
+index 2496d09..5b5bd14 100644
+--- a/agent/divert-tpm2.c
++++ b/agent/divert-tpm2.c
+@@ -135,6 +135,15 @@ divert_tpm2_pkdecrypt (ctrl_t ctrl,
+ if (!smatch (&s, n, "a"))
+ return gpg_error (GPG_ERR_UNKNOWN_SEXP);
+ n = snext (&s);
++ /* NOTE: gpg-agent protocol uses signed integer for RSA (%m in
++ * MPI), where 0x00 is added when the MSB is 1. TPM2 uses
++ * unsigned integer. We need to remove this 0x00, or else
++ * it may result GPG_ERR_TOO_LARGE in tpm2daemon. */
++ if (!*s && (n&1))
++ {
++ s++;
++ n--;
++ }
+ }
+ else if (smatch (&s, n, "ecdh"))
+ {
+--
+2.34.1
+
diff --git a/meta/recipes-support/gnupg/gnupg_2.4.8.bb b/meta/recipes-support/gnupg/gnupg_2.4.8.bb
index 2d27f4454e5..6a865ed57d9 100644
--- a/meta/recipes-support/gnupg/gnupg_2.4.8.bb
+++ b/meta/recipes-support/gnupg/gnupg_2.4.8.bb
@@ -19,6 +19,8 @@ SRC_URI = "${GNUPG_MIRROR}/${BPN}/${BPN}-${PV}.tar.bz2 \
file://0004-autogen.sh-fix-find-version-for-beta-checking.patch \
file://0001-Woverride-init-is-not-needed-with-gcc-9.patch \
file://CVE-2025-68973.patch \
+ file://CVE-2026-24882-0001.patch \
+ file://CVE-2026-24882-0002.patch \
"
SRC_URI:append:class-native = " file://0001-configure.ac-use-a-custom-value-for-the-location-of-.patch \
file://relocate.patch"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 26/66] libxml2: Fix CVE-2026-1757
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (24 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 25/66] gnupg: fix CVE-2026-24882 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 27/66] base-passwd: upgrade 3.6.3 -> 3.6.8 Yoann Congal
` (39 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Mingli Yu <mingli.yu@windriver.com>
Backport patch [1] to fix CVE-2026-1757.
The shell is refactored [2], so backport the related code from shell.c
to debugXML.c.
[1] https://gitlab.gnome.org/GNOME/libxml2/-/commit/160c8a43
[2] https://gitlab.gnome.org/GNOME/libxml2/-/commit/1341deac
Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
Signed-off-by: Jinfeng Wang <jinfeng.wang.cn@windriver.com>
[YC: see https://security-tracker.debian.org/tracker/CVE-2026-1757 ]
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../libxml/libxml2/CVE-2026-1757.patch | 49 +++++++++++++++++++
meta/recipes-core/libxml/libxml2_2.12.10.bb | 1 +
2 files changed, 50 insertions(+)
create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2026-1757.patch
diff --git a/meta/recipes-core/libxml/libxml2/CVE-2026-1757.patch b/meta/recipes-core/libxml/libxml2/CVE-2026-1757.patch
new file mode 100644
index 00000000000..b6e6373ab0c
--- /dev/null
+++ b/meta/recipes-core/libxml/libxml2/CVE-2026-1757.patch
@@ -0,0 +1,49 @@
+From bbe186902eddca01cc2049780a1d1a37937d3862 Mon Sep 17 00:00:00 2001
+From: Mingli Yu <mingli.yu@windriver.com>
+Date: Wed, 25 Feb 2026 16:16:14 +0800
+Subject: [PATCH] shell: free cmdline before continue
+
+This patch frees the cmdline when it's not empty but it doesn't contain
+any actual character.
+
+If the cmdline is just whitespaces or \r and \n, the loop continues
+without freeing the cmdline string, so it's a leak.
+
+Fix #1009
+
+Reference https://gitlab.gnome.org/GNOME/libxml2/-/commit/160c8a43
+
+CVE: CVE-2026-1757
+
+Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/-/commit/160c8a43]
+
+The shell is refactored [1], so backport the related code from shell.c
+to debugXML.c.
+
+[1] https://gitlab.gnome.org/GNOME/libxml2/-/commit/1341deac
+
+Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
+---
+ debugXML.c | 5 ++++-
+ 1 file changed, 4 insertions(+), 1 deletion(-)
+
+diff --git a/debugXML.c b/debugXML.c
+index 9d9618f..2d5c99d 100644
+--- a/debugXML.c
++++ b/debugXML.c
+@@ -2866,8 +2866,11 @@ xmlShell(xmlDocPtr doc, char *filename, xmlShellReadlineFunc input,
+ command[i++] = *cur++;
+ }
+ command[i] = 0;
+- if (i == 0)
++ if (i == 0) {
++ free(cmdline);
++ cmdline = NULL;
+ continue;
++ }
+
+ /*
+ * Parse the argument
+--
+2.34.1
+
diff --git a/meta/recipes-core/libxml/libxml2_2.12.10.bb b/meta/recipes-core/libxml/libxml2_2.12.10.bb
index 25da11bd2d3..2bfa78324f6 100644
--- a/meta/recipes-core/libxml/libxml2_2.12.10.bb
+++ b/meta/recipes-core/libxml/libxml2_2.12.10.bb
@@ -30,6 +30,7 @@ SRC_URI += "http://www.w3.org/XML/Test/xmlts20130923.tar;subdir=${BP};name=testt
file://CVE-2026-0992-01.patch \
file://CVE-2026-0992-02.patch \
file://CVE-2026-0992-03.patch \
+ file://CVE-2026-1757.patch \
"
SRC_URI[archive.sha256sum] = "c3d8c0c34aa39098f66576fe51969db12a5100b956233dc56506f7a8679be995"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 27/66] base-passwd: upgrade 3.6.3 -> 3.6.8
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (25 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 26/66] libxml2: Fix CVE-2026-1757 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 28/66] mesa: fix build on host with glibc-2.43 Yoann Congal
` (38 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Daniel Turull <daniel.turull@ericsson.com>
Changelog for base-passwd: 3.6.3 -> 3.6.8
============================================================
base-passwd (3.6.8) unstable; urgency=medium
* Debconf translations:
- Turkish (thanks, Nuri KÜÇÜKLER; closes: #1102464).
* update-passwd(8) translations:
- French (thanks, Baptiste Jammet; closes: #1119914).
-- Colin Watson <cjwatson@debian.org> Mon, 03 Nov 2025 11:03:53 +0000
base-passwd (3.6.7) unstable; urgency=medium
[ Marc Haber ]
* Add myself to Uploaders.
[ Colin Watson ]
* Debconf translations:
- Catalan (thanks, Carles Pina i Estany; closes: #1101110).
-- Colin Watson <cjwatson@debian.org> Sun, 23 Mar 2025 15:30:08 +0000
base-passwd (3.6.6) unstable; urgency=medium
* Move to team maintenance under pkg-shadow-devel.
-- Colin Watson <cjwatson@debian.org> Sun, 29 Dec 2024 13:43:54 +0000
base-passwd (3.6.5) unstable; urgency=medium
[ Colin Watson ]
* Apply X-Style: black.
* Add Romanian translation of update-passwd(8) (thanks, Remus-Gabriel
Chelu; closes: #1055383).
[ Maks Mishin ]
* Fix potential descriptor leaks.
-- Colin Watson <cjwatson@debian.org> Mon, 21 Oct 2024 18:26:50 +0100
base-passwd (3.6.4) unstable; urgency=medium
[ Chris Hofstaedtler ]
* Ensure that /etc/subuid and /etc/subgid exist (closes: #1074121).
-- Colin Watson <cjwatson@debian.org> Mon, 01 Jul 2024 12:20:04 +0100
Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../0001-Add-a-shutdown-group.patch | 6 +++---
.../0001-base-passwd-Add-the-sgx-group.patch | 4 ++--
...instead-of-bin-bash-for-the-root-user.patch | 4 ++--
...ot-since-we-do-not-have-an-etc-shadow.patch | 4 ++--
...input-group-for-the-dev-input-devices.patch | 4 ++--
.../base-passwd/0005-Add-kvm-group.patch | 6 +++---
.../base-passwd/0007-Add-wheel-group.patch | 18 +++++++++++++-----
...se-passwd_3.6.3.bb => base-passwd_3.6.8.bb} | 2 +-
8 files changed, 28 insertions(+), 20 deletions(-)
rename meta/recipes-core/base-passwd/{base-passwd_3.6.3.bb => base-passwd_3.6.8.bb} (98%)
diff --git a/meta/recipes-core/base-passwd/base-passwd/0001-Add-a-shutdown-group.patch b/meta/recipes-core/base-passwd/base-passwd/0001-Add-a-shutdown-group.patch
index e50efc9623f..f0e1539ca7f 100644
--- a/meta/recipes-core/base-passwd/base-passwd/0001-Add-a-shutdown-group.patch
+++ b/meta/recipes-core/base-passwd/base-passwd/0001-Add-a-shutdown-group.patch
@@ -1,4 +1,4 @@
-From 8f3ace87df3aaad85946c22cae240532ea3e73b8 Mon Sep 17 00:00:00 2001
+From 6f714635792a14fd3ee8d2ce0318c0185add5c00 Mon Sep 17 00:00:00 2001
From: Saul Wold <sgw@linux.intel.com>
Date: Fri, 29 Apr 2022 13:32:27 +0000
Subject: [PATCH] Add a shutdown group
@@ -14,10 +14,10 @@ Signed-off-by: Saul Wold <sgw@linux.intel.com>
1 file changed, 1 insertion(+)
diff --git a/group.master b/group.master
-index ad1dd2d..1b5e2fb 100644
+index 3e7bf1c..72108a8 100644
--- a/group.master
+++ b/group.master
-@@ -35,5 +35,6 @@ sasl:*:45:
+@@ -34,5 +34,6 @@ sasl:*:45:
plugdev:*:46:
staff:*:50:
games:*:60:
diff --git a/meta/recipes-core/base-passwd/base-passwd/0001-base-passwd-Add-the-sgx-group.patch b/meta/recipes-core/base-passwd/base-passwd/0001-base-passwd-Add-the-sgx-group.patch
index e1340e1b70c..d50136b24e1 100644
--- a/meta/recipes-core/base-passwd/base-passwd/0001-base-passwd-Add-the-sgx-group.patch
+++ b/meta/recipes-core/base-passwd/base-passwd/0001-base-passwd-Add-the-sgx-group.patch
@@ -1,4 +1,4 @@
-From 9e57771d138ac423d5139b984b8c869122ce4976 Mon Sep 17 00:00:00 2001
+From ff622d69e9c06c00dacdffc163a383f8d2903475 Mon Sep 17 00:00:00 2001
From: Alex Kiernan <alexk@zuma.ai>
Date: Fri, 28 Jul 2023 10:28:57 +0100
Subject: [PATCH] base-passwd: Add the sgx group
@@ -17,7 +17,7 @@ Signed-off-by: Alex Kiernan <alex.kiernan@gmail.com>
1 file changed, 1 insertion(+)
diff --git a/group.master b/group.master
-index d34d2b832d43..e54fd1d2c6dc 100644
+index d34d2b8..e54fd1d 100644
--- a/group.master
+++ b/group.master
@@ -34,6 +34,7 @@ video:*:44:
diff --git a/meta/recipes-core/base-passwd/base-passwd/0002-Use-bin-sh-instead-of-bin-bash-for-the-root-user.patch b/meta/recipes-core/base-passwd/base-passwd/0002-Use-bin-sh-instead-of-bin-bash-for-the-root-user.patch
index 09f8cfea9c6..0fa6b8138d0 100644
--- a/meta/recipes-core/base-passwd/base-passwd/0002-Use-bin-sh-instead-of-bin-bash-for-the-root-user.patch
+++ b/meta/recipes-core/base-passwd/base-passwd/0002-Use-bin-sh-instead-of-bin-bash-for-the-root-user.patch
@@ -1,4 +1,4 @@
-From 4411fc0df77566d52bee11ec0bad4be30a96e99e Mon Sep 17 00:00:00 2001
+From c30862c6892d17ae2f4578101dcb050250956cec Mon Sep 17 00:00:00 2001
From: Scott Garman <scott.a.garman@intel.com>
Date: Fri, 29 Apr 2022 13:32:27 +0000
Subject: [PATCH] Use /bin/sh instead of /bin/bash for the root user
@@ -12,7 +12,7 @@ Signed-off-by: Scott Garman <scott.a.garman@intel.com>
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/passwd.master b/passwd.master
-index 7cd4e24..041685a 100644
+index 90514a5..bd3efc2 100644
--- a/passwd.master
+++ b/passwd.master
@@ -1,4 +1,4 @@
diff --git a/meta/recipes-core/base-passwd/base-passwd/0003-Remove-for-root-since-we-do-not-have-an-etc-shadow.patch b/meta/recipes-core/base-passwd/base-passwd/0003-Remove-for-root-since-we-do-not-have-an-etc-shadow.patch
index 06222ab04ce..4be487cc3f5 100644
--- a/meta/recipes-core/base-passwd/base-passwd/0003-Remove-for-root-since-we-do-not-have-an-etc-shadow.patch
+++ b/meta/recipes-core/base-passwd/base-passwd/0003-Remove-for-root-since-we-do-not-have-an-etc-shadow.patch
@@ -1,4 +1,4 @@
-From 13a1a284a134d18a454625a5b4485c0d99079ae9 Mon Sep 17 00:00:00 2001
+From 0d35229f01e3a38a27338320e67c4cb5652a3249 Mon Sep 17 00:00:00 2001
From: Scott Garman <scott.a.garman@intel.com>
Date: Fri, 29 Apr 2022 13:32:28 +0000
Subject: [PATCH] Remove "*" for root since we do not have an /etc/shadow
@@ -10,7 +10,7 @@ Signed-off-by: Scott Garman <scott.a.garman@intel.com>
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/passwd.master b/passwd.master
-index 041685a..31a84d4 100644
+index bd3efc2..66e9033 100644
--- a/passwd.master
+++ b/passwd.master
@@ -1,4 +1,4 @@
diff --git a/meta/recipes-core/base-passwd/base-passwd/0004-Add-an-input-group-for-the-dev-input-devices.patch b/meta/recipes-core/base-passwd/base-passwd/0004-Add-an-input-group-for-the-dev-input-devices.patch
index 394a0f01d32..a3502c3d861 100644
--- a/meta/recipes-core/base-passwd/base-passwd/0004-Add-an-input-group-for-the-dev-input-devices.patch
+++ b/meta/recipes-core/base-passwd/base-passwd/0004-Add-an-input-group-for-the-dev-input-devices.patch
@@ -1,4 +1,4 @@
-From c5f012750f8102ff54af73ccc2d2b7bfa1f26db4 Mon Sep 17 00:00:00 2001
+From d2cdd4c8d7332d05ac86fb0625e8c2b3c7bf7728 Mon Sep 17 00:00:00 2001
From: Darren Hart <dvhart@linux.intel.com>
Date: Fri, 29 Apr 2022 13:32:28 +0000
Subject: [PATCH] Add an input group for the /dev/input/* devices
@@ -10,7 +10,7 @@ Signed-off-by: Darren Hart <dvhart@linux.intel.com>
1 file changed, 1 insertion(+)
diff --git a/group.master b/group.master
-index 1b5e2fb..cea9d60 100644
+index 72108a8..7d794b2 100644
--- a/group.master
+++ b/group.master
@@ -12,6 +12,7 @@ uucp:*:10:
diff --git a/meta/recipes-core/base-passwd/base-passwd/0005-Add-kvm-group.patch b/meta/recipes-core/base-passwd/base-passwd/0005-Add-kvm-group.patch
index 72e6ee333c9..4f8278e5cd1 100644
--- a/meta/recipes-core/base-passwd/base-passwd/0005-Add-kvm-group.patch
+++ b/meta/recipes-core/base-passwd/base-passwd/0005-Add-kvm-group.patch
@@ -1,4 +1,4 @@
-From 6cf19461fb31d7a7a3010629aae9aab49c26a01b Mon Sep 17 00:00:00 2001
+From 07af34abb10b1455e065cfb1ce7ce766614da7e8 Mon Sep 17 00:00:00 2001
From: Jacob Kroon <jacob.kroon@gmail.com>
Date: Wed, 30 Jan 2019 04:53:48 +0000
Subject: [PATCH] Add kvm group
@@ -10,10 +10,10 @@ Signed-off-by: Jacob Kroon <jacob.kroon@gmail.com>
1 file changed, 1 insertion(+)
diff --git a/group.master b/group.master
-index cea9d60..5b62284 100644
+index 7d794b2..7fdd8bf 100644
--- a/group.master
+++ b/group.master
-@@ -34,6 +34,7 @@ utmp:*:43:
+@@ -33,6 +33,7 @@ utmp:*:43:
video:*:44:
sasl:*:45:
plugdev:*:46:
diff --git a/meta/recipes-core/base-passwd/base-passwd/0007-Add-wheel-group.patch b/meta/recipes-core/base-passwd/base-passwd/0007-Add-wheel-group.patch
index d77122789d5..91bbb453e32 100644
--- a/meta/recipes-core/base-passwd/base-passwd/0007-Add-wheel-group.patch
+++ b/meta/recipes-core/base-passwd/base-passwd/0007-Add-wheel-group.patch
@@ -1,3 +1,7 @@
+From 3c88afb923de603d126f89f2979b2cd232a180c8 Mon Sep 17 00:00:00 2001
+From: Louis Rannou <lrannou@baylibre.com>
+Date: Thu, 15 Jun 2023 13:43:55 +0200
+Subject: [PATCH] base-passwd: add the wheel group
We need to have a wheel group which has some system privileges to consult the
systemd journal or manage printers with cups.
@@ -7,11 +11,15 @@ Upstream says the group does not exist by default.
Upstream-Status: Inappropriate [enable feature]
Signed-off-by: Louis Rannou <lrannou@baylibre.com>
-Index: base-passwd-3.5.26/group.master
-===================================================================
---- base-passwd-3.5.29.orig/group.master
-+++ base-passwd-3.5.29/group.master
-@@ -38,5 +38,6 @@
+---
+ group.master | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/group.master b/group.master
+index 7fdd8bf..d34d2b8 100644
+--- a/group.master
++++ b/group.master
+@@ -37,5 +37,6 @@ kvm:*:47:
staff:*:50:
games:*:60:
shutdown:*:70:
diff --git a/meta/recipes-core/base-passwd/base-passwd_3.6.3.bb b/meta/recipes-core/base-passwd/base-passwd_3.6.8.bb
similarity index 98%
rename from meta/recipes-core/base-passwd/base-passwd_3.6.3.bb
rename to meta/recipes-core/base-passwd/base-passwd_3.6.8.bb
index bf50b01fd5a..a072791dcf1 100644
--- a/meta/recipes-core/base-passwd/base-passwd_3.6.3.bb
+++ b/meta/recipes-core/base-passwd/base-passwd_3.6.8.bb
@@ -15,7 +15,7 @@ SRC_URI = "https://launchpad.net/debian/+archive/primary/+files/${BPN}_${PV}.tar
file://0001-base-passwd-Add-the-sgx-group.patch \
"
-SRC_URI[sha256sum] = "83575327d8318a419caf2d543341215c046044073d1afec2acc0ac4d8095ff39"
+SRC_URI[sha256sum] = "fab3d0e6e8b641e116bda9bd5f7a7ed24482384c1513f6a369b506327fbc8dde"
# the package is taken from launchpad; that source is static and goes stale
# so we check the latest upstream from a directory that does get updated
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 28/66] mesa: fix build on host with glibc-2.43
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (26 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 27/66] base-passwd: upgrade 3.6.3 -> 3.6.8 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 29/66] virglrenderer: Fix build with glibc 2.43+ Yoann Congal
` (37 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../0001-c11-threads-fix-build-on-c23.patch | 56 +++++++++++++++++++
meta/recipes-graphics/mesa/mesa.inc | 1 +
2 files changed, 57 insertions(+)
create mode 100644 meta/recipes-graphics/mesa/files/0001-c11-threads-fix-build-on-c23.patch
diff --git a/meta/recipes-graphics/mesa/files/0001-c11-threads-fix-build-on-c23.patch b/meta/recipes-graphics/mesa/files/0001-c11-threads-fix-build-on-c23.patch
new file mode 100644
index 00000000000..f4de5e61a9b
--- /dev/null
+++ b/meta/recipes-graphics/mesa/files/0001-c11-threads-fix-build-on-c23.patch
@@ -0,0 +1,56 @@
+From 3f007af78283aea2e8c1a3addff7aeae862d8b28 Mon Sep 17 00:00:00 2001
+From: Dave Airlie <airlied@redhat.com>
+Date: Fri, 7 Nov 2025 13:14:56 +1000
+Subject: [PATCH] c11/threads: fix build on c23
+
+C23/glibc is now including once_init in stdlib.h
+
+https://patchwork.sourceware.org/project/glibc/patch/78061085-f04a-0c45-107b-5a8a15521083@redhat.com/#213088
+
+Just fix up our use of it.
+
+Cc: mesa-stable
+Reviewed-by: Yonggang Luo <luoyonggang@gmail.com>
+Part-of: <https://gitlab.freedesktop.org/mesa/mesa/-/merge_requests/38298>
+
+Upstream-Status: Backport [v26.0.0 179e744f7577d98df7c79d7324c22acfb32a0154]
+Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
+---
+ src/c11/impl/threads_posix.c | 3 ++-
+ src/c11/threads.h | 2 ++
+ 2 files changed, 4 insertions(+), 1 deletion(-)
+
+diff --git a/src/c11/impl/threads_posix.c b/src/c11/impl/threads_posix.c
+index 2540e3e0c49..f75774fc51d 100644
+--- a/src/c11/impl/threads_posix.c
++++ b/src/c11/impl/threads_posix.c
+@@ -70,12 +70,13 @@ impl_thrd_routine(void *p)
+
+ /*--------------- 7.25.2 Initialization functions ---------------*/
+ // 7.25.2.1
++#ifndef __once_flag_defined
+ void
+ call_once(once_flag *flag, void (*func)(void))
+ {
+ pthread_once(flag, func);
+ }
+-
++#endif
+
+ /*------------- 7.25.3 Condition variable functions -------------*/
+ // 7.25.3.1
+diff --git a/src/c11/threads.h b/src/c11/threads.h
+index dbcb3459a9b..c849f385e30 100644
+--- a/src/c11/threads.h
++++ b/src/c11/threads.h
+@@ -118,8 +118,10 @@ typedef pthread_cond_t cnd_t;
+ typedef pthread_t thrd_t;
+ typedef pthread_key_t tss_t;
+ typedef pthread_mutex_t mtx_t;
++#ifndef __once_flag_defined
+ typedef pthread_once_t once_flag;
+ # define ONCE_FLAG_INIT PTHREAD_ONCE_INIT
++#endif
+ # ifdef PTHREAD_DESTRUCTOR_ITERATIONS
+ # define TSS_DTOR_ITERATIONS PTHREAD_DESTRUCTOR_ITERATIONS
+ # else
diff --git a/meta/recipes-graphics/mesa/mesa.inc b/meta/recipes-graphics/mesa/mesa.inc
index 9157fe9c3f2..eb23a3f82c3 100644
--- a/meta/recipes-graphics/mesa/mesa.inc
+++ b/meta/recipes-graphics/mesa/mesa.inc
@@ -19,6 +19,7 @@ SRC_URI = "https://mesa.freedesktop.org/archive/mesa-${PV}.tar.xz \
file://0001-drisw-fix-build-without-dri3.patch \
file://0002-glxext-don-t-try-zink-if-not-enabled-in-mesa.patch \
file://0001-Revert-meson-do-not-pull-in-clc-for-clover.patch \
+ file://0001-c11-threads-fix-build-on-c23.patch \
"
SRC_URI[sha256sum] = "7454425f1ed4a6f1b5b107e1672b30c88b22ea0efea000ae2c7d96db93f6c26a"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 29/66] virglrenderer: Fix build with glibc 2.43+
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (27 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 28/66] mesa: fix build on host with glibc-2.43 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 30/66] cmake: backport a fix for gcc-16 on host Yoann Congal
` (36 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
(cherry picked from commit 8e85dc6b7f5f7668a610b5fd3754c716f0af65b0)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
...once_flag-ONCE_FLAG_INIT-when-presen.patch | 55 +++++++++++++++++++
.../virglrenderer/virglrenderer_1.0.1.bb | 1 +
2 files changed, 56 insertions(+)
create mode 100644 meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch
diff --git a/meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch b/meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch
new file mode 100644
index 00000000000..1740d7605f8
--- /dev/null
+++ b/meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch
@@ -0,0 +1,55 @@
+From 179e744f7577d98df7c79d7324c22acfb32a0154 Mon Sep 17 00:00:00 2001
+From: Dave Airlie <airlied@redhat.com>
+Date: Fri, 7 Nov 2025 13:14:56 +1000
+Subject: [PATCH] c11/threads: fix build on c23
+
+C23/glibc is now including once_init in stdlib.h
+
+https://patchwork.sourceware.org/project/glibc/patch/78061085-f04a-0c45-107b-5a8a15521083@redhat.com/#213088
+
+Just fix up our use of it.
+
+Upstream-Status: Submitted [https://gitlab.freedesktop.org/virgl/virglrenderer/-/merge_requests/1567]
+Signed-off-by: Khem Raj <raj.khem@gmail.com>
+---
+ src/mesa/compat/c11/impl/threads_posix.c | 3 ++-
+ 2 files changed, 4 insertions(+), 1 deletion(-)
+
+--- a/src/mesa/compat/c11/threads_posix.h
++++ b/src/mesa/compat/c11/threads_posix.h
+@@ -51,7 +51,9 @@ Configuration macro:
+ #include <pthread.h>
+
+ /*---------------------------- macros ----------------------------*/
++#ifndef __once_flag_defined
+ #define ONCE_FLAG_INIT PTHREAD_ONCE_INIT
++#endif
+ #ifdef INIT_ONCE_STATIC_INIT
+ #define TSS_DTOR_ITERATIONS PTHREAD_DESTRUCTOR_ITERATIONS
+ #else
+@@ -66,8 +68,9 @@ typedef pthread_cond_t cnd_t;
+ typedef pthread_t thrd_t;
+ typedef pthread_key_t tss_t;
+ typedef pthread_mutex_t mtx_t;
++#ifndef __once_flag_defined
+ typedef pthread_once_t once_flag;
+-
++#endif
+
+ /*
+ Implementation limits:
+@@ -90,12 +93,13 @@ impl_thrd_routine(void *p)
+
+ /*--------------- 7.25.2 Initialization functions ---------------*/
+ // 7.25.2.1
++#ifndef __once_flag_defined
+ static inline void
+ call_once(once_flag *flag, void (*func)(void))
+ {
+ pthread_once(flag, func);
+ }
+-
++#endif
+
+ /*------------- 7.25.3 Condition variable functions -------------*/
+ // 7.25.3.1
diff --git a/meta/recipes-graphics/virglrenderer/virglrenderer_1.0.1.bb b/meta/recipes-graphics/virglrenderer/virglrenderer_1.0.1.bb
index 87f25a34610..a6145c15f6d 100644
--- a/meta/recipes-graphics/virglrenderer/virglrenderer_1.0.1.bb
+++ b/meta/recipes-graphics/virglrenderer/virglrenderer_1.0.1.bb
@@ -13,6 +13,7 @@ SRCREV = "690680e5f0f952e22424fca1538c1b24457a0868"
SRC_URI = "git://gitlab.freedesktop.org/virgl/virglrenderer.git;branch=main;protocol=https \
file://0001-meson.build-use-python3-directly-for-python.patch \
file://0001-vrend-Fix-int-conversion-fatal-build-error-with-GCC-.patch \
+ file://0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch \
"
S = "${WORKDIR}/git"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 30/66] cmake: backport a fix for gcc-16 on host
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (28 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 29/66] virglrenderer: Fix build with glibc 2.43+ Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 31/66] gcc: backport a fix for building with gcc-16 Yoann Congal
` (35 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../cmake/cmake-native_3.28.3.bb | 1 +
...mpilation-with-gcc-16-devirtualizati.patch | 36 +++++++++++++++++++
meta/recipes-devtools/cmake/cmake_3.28.3.bb | 4 ++-
3 files changed, 40 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-devtools/cmake/cmake/0001-bootstrap-Fix-compilation-with-gcc-16-devirtualizati.patch
diff --git a/meta/recipes-devtools/cmake/cmake-native_3.28.3.bb b/meta/recipes-devtools/cmake/cmake-native_3.28.3.bb
index 7b250752d80..eecc2df5387 100644
--- a/meta/recipes-devtools/cmake/cmake-native_3.28.3.bb
+++ b/meta/recipes-devtools/cmake/cmake-native_3.28.3.bb
@@ -8,6 +8,7 @@ SRC_URI += "file://OEToolchainConfig.cmake \
file://0005-Disable-use-of-ext2fs-ext2_fs.h-by-cmake-s-internal-.patch \
file://0001-CMakeLists.txt-disable-USE_NGHTTP2.patch \
file://CVE-2025-9301.patch \
+ file://0001-bootstrap-Fix-compilation-with-gcc-16-devirtualizati.patch \
"
LICENSE:append = " & BSD-1-Clause & MIT & BSD-2-Clause & curl"
diff --git a/meta/recipes-devtools/cmake/cmake/0001-bootstrap-Fix-compilation-with-gcc-16-devirtualizati.patch b/meta/recipes-devtools/cmake/cmake/0001-bootstrap-Fix-compilation-with-gcc-16-devirtualizati.patch
new file mode 100644
index 00000000000..2f28e3a7ba9
--- /dev/null
+++ b/meta/recipes-devtools/cmake/cmake/0001-bootstrap-Fix-compilation-with-gcc-16-devirtualizati.patch
@@ -0,0 +1,36 @@
+From 0f8fdfb55950e383d9780b875bc8d7213db8a42a Mon Sep 17 00:00:00 2001
+From: Brad King <brad.king@kitware.com>
+Date: Wed, 24 Sep 2025 12:02:37 -0400
+Subject: [PATCH] bootstrap: Fix compilation with gcc 16 devirtualization
+
+Avoid including a header for a subclass whose implementation is not
+compiled during bootstrap.
+
+Fixes: #27256
+
+Upstream-Status: Backport [v3.31.10 ea04e19daf7010781d0df980b9683a642093e381 https://gitlab.kitware.com/cmake/cmake/-/merge_requests/11243]
+Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
+---
+ Source/cmake.cxx | 6 +++---
+ 1 file changed, 3 insertions(+), 3 deletions(-)
+
+diff --git a/Source/cmake.cxx b/Source/cmake.cxx
+index 636a0da5b8..0e05afb7a6 100644
+--- a/Source/cmake.cxx
++++ b/Source/cmake.cxx
+@@ -124,12 +124,12 @@
+ # include "cmExtraEclipseCDT4Generator.h"
+ # include "cmExtraKateGenerator.h"
+ # include "cmExtraSublimeTextGenerator.h"
+-#endif
+
+ // NOTE: the __linux__ macro is predefined on Android host too, but
+ // main CMakeLists.txt filters out this generator by host name.
+-#if (defined(__linux__) && !defined(__ANDROID__)) || defined(_WIN32)
+-# include "cmGlobalGhsMultiGenerator.h"
++# if (defined(__linux__) && !defined(__ANDROID__)) || defined(_WIN32)
++# include "cmGlobalGhsMultiGenerator.h"
++# endif
+ #endif
+
+ #if defined(__APPLE__)
diff --git a/meta/recipes-devtools/cmake/cmake_3.28.3.bb b/meta/recipes-devtools/cmake/cmake_3.28.3.bb
index 1841bfd1cfd..f018ca21ff1 100644
--- a/meta/recipes-devtools/cmake/cmake_3.28.3.bb
+++ b/meta/recipes-devtools/cmake/cmake_3.28.3.bb
@@ -11,7 +11,9 @@ SRC_URI:append:class-nativesdk = " \
file://cmake-setup.py \
file://environment.d-cmake.sh \
"
-SRC_URI += "file://CVE-2025-9301.patch"
+SRC_URI += "file://CVE-2025-9301.patch \
+ file://0001-bootstrap-Fix-compilation-with-gcc-16-devirtualizati.patch \
+"
LICENSE:append = " & BSD-1-Clause & MIT"
LIC_FILES_CHKSUM:append = " \
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 31/66] gcc: backport a fix for building with gcc-16
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (29 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 30/66] cmake: backport a fix for gcc-16 on host Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 32/66] libxcrypt: avoid discarded-qualifiers build failure with glibc 2.43 Yoann Congal
` (34 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Martin Jansa <martin.jansa@gmail.com>
Fixes:
https://errors.yoctoproject.org/Errors/Details/905192/
when building on host with gcc-16
Compared to 15.2 used in whinlatter this needs 2 additional backports.
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 9eabea38f0c17d41d97284d63a25e45da3c9bbcc)
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-devtools/gcc/gcc-13.4.inc | 3 +
...dy-Make-it-buildable-by-C-11-to-C-26.patch | 257 ++++++++++++++++++
...build-Remove-INCLUDE_MEMORY-PR117737.patch | 46 ++++
...am-include-above-safe-ctype.h-PR1177.patch | 54 ++++
4 files changed, 360 insertions(+)
create mode 100644 meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch
create mode 100644 meta/recipes-devtools/gcc/gcc/0029-build-Remove-INCLUDE_MEMORY-PR117737.patch
create mode 100644 meta/recipes-devtools/gcc/gcc/0030-build-Move-sstream-include-above-safe-ctype.h-PR1177.patch
diff --git a/meta/recipes-devtools/gcc/gcc-13.4.inc b/meta/recipes-devtools/gcc/gcc-13.4.inc
index eefae13530e..2017c444986 100644
--- a/meta/recipes-devtools/gcc/gcc-13.4.inc
+++ b/meta/recipes-devtools/gcc/gcc-13.4.inc
@@ -66,6 +66,9 @@ SRC_URI = "${BASEURI} \
file://0024-Avoid-hardcoded-build-paths-into-ppc-libgcc.patch \
file://0025-gcc-testsuite-tweaks-for-mips-OE.patch \
file://0027-Fix-gcc-vect-module-testcases.patch \
+ file://0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch \
+ file://0029-build-Remove-INCLUDE_MEMORY-PR117737.patch \
+ file://0030-build-Move-sstream-include-above-safe-ctype.h-PR1177.patch \
"
SRC_URI[sha256sum] = "9c4ce6dbb040568fdc545588ac03c5cbc95a8dbf0c7aa490170843afb59ca8f5"
diff --git a/meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch b/meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch
new file mode 100644
index 00000000000..431facb0110
--- /dev/null
+++ b/meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch
@@ -0,0 +1,257 @@
+From 0ffe3c9af4e5d5468df742512b6e930fe7039230 Mon Sep 17 00:00:00 2001
+From: Jakub Jelinek <jakub@redhat.com>
+Date: Fri, 21 Nov 2025 16:25:58 +0100
+Subject: [PATCH] libcody: Make it buildable by C++11 to C++26
+
+The following builds with -std=c++11 and c++14 and c++17 and c++20 and c++23
+and c++26.
+
+I see the u8 string literals are mixed e.g. with strerror, so in
+-fexec-charset=IBM1047 there will still be garbage, so am not 100% sure if
+the u8 literals everywhere are worth it either.
+
+2025-11-21 Jakub Jelinek <jakub@redhat.com>
+
+ * cody.hh (S2C): For __cpp_char8_t >= 201811 use char8_t instead of
+ char in argument type.
+ (MessageBuffer::Space): Revert 2025-11-15 change.
+ (MessageBuffer::Append): For __cpp_char8_t >= 201811 add overload
+ with char8_t const * type of first argument.
+ (Packet::Packet): Similarly for first argument.
+ * client.cc (CommunicationError, Client::ProcessResponse,
+ Client::Connect, ConnectResponse, PathnameResponse, OKResponse,
+ IncludeTranslateResponse): Cast u8 string literals to (const char *)
+ where needed.
+ * server.cc (Server::ProcessRequests, ConnectRequest): Likewise.
+
+Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
+Upstream-Status: Backport [07a767c7a50d1daae8ef7d4aba73fe53ad40c0b7]
+---
+ libcody/client.cc | 36 +++++++++++++++++++-----------------
+ libcody/cody.hh | 22 ++++++++++++++++++++++
+ libcody/server.cc | 28 ++++++++++++++--------------
+ 3 files changed, 55 insertions(+), 31 deletions(-)
+
+diff --git a/libcody/client.cc b/libcody/client.cc
+index ae69d190cb77..147fecdbe500 100644
+--- a/libcody/client.cc
++++ b/libcody/client.cc
+@@ -97,7 +97,7 @@ int Client::CommunicateWithServer ()
+
+ static Packet CommunicationError (int err)
+ {
+- std::string e {u8"communication error:"};
++ std::string e {(const char *) u8"communication error:"};
+ e.append (strerror (err));
+
+ return Packet (Client::PC_ERROR, std::move (e));
+@@ -110,33 +110,34 @@ Packet Client::ProcessResponse (std::vector<std::string> &words,
+ {
+ if (e == EINVAL)
+ {
+- std::string msg (u8"malformed string '");
++ std::string msg ((const char *) u8"malformed string '");
+ msg.append (words[0]);
+- msg.append (u8"'");
++ msg.append ((const char *) u8"'");
+ return Packet (Client::PC_ERROR, std::move (msg));
+ }
+ else
+- return Packet (Client::PC_ERROR, u8"missing response");
++ return Packet (Client::PC_ERROR, (const char *) u8"missing response");
+ }
+
+ Assert (!words.empty ());
+- if (words[0] == u8"ERROR")
++ if (words[0] == (const char *) u8"ERROR")
+ return Packet (Client::PC_ERROR,
+- words.size () == 2 ? words[1]: u8"malformed error response");
++ words.size () == 2 ? words[1]
++ : (const char *) u8"malformed error response");
+
+ if (isLast && !read.IsAtEnd ())
+ return Packet (Client::PC_ERROR,
+- std::string (u8"unexpected extra response"));
++ std::string ((const char *) u8"unexpected extra response"));
+
+ Assert (code < Detail::RC_HWM);
+ Packet result (responseTable[code] (words));
+ result.SetRequest (code);
+ if (result.GetCode () == Client::PC_ERROR && result.GetString ().empty ())
+ {
+- std::string msg {u8"malformed response '"};
++ std::string msg {(const char *) u8"malformed response '"};
+
+ read.LexedLine (msg);
+- msg.append (u8"'");
++ msg.append ((const char *) u8"'");
+ result.GetString () = std::move (msg);
+ }
+ else if (result.GetCode () == Client::PC_CONNECT)
+@@ -199,7 +200,7 @@ Packet Client::Connect (char const *agent, char const *ident,
+ size_t alen, size_t ilen)
+ {
+ write.BeginLine ();
+- write.AppendWord (u8"HELLO");
++ write.AppendWord ((const char *) u8"HELLO");
+ write.AppendInteger (Version);
+ write.AppendWord (agent, true, alen);
+ write.AppendWord (ident, true, ilen);
+@@ -211,7 +212,8 @@ Packet Client::Connect (char const *agent, char const *ident,
+ // HELLO $version $agent [$flags]
+ Packet ConnectResponse (std::vector<std::string> &words)
+ {
+- if (words[0] == u8"HELLO" && (words.size () == 3 || words.size () == 4))
++ if (words[0] == (const char *) u8"HELLO"
++ && (words.size () == 3 || words.size () == 4))
+ {
+ char *eptr;
+ unsigned long val = strtoul (words[1].c_str (), &eptr, 10);
+@@ -247,7 +249,7 @@ Packet Client::ModuleRepo ()
+ // PATHNAME $dir | ERROR
+ Packet PathnameResponse (std::vector<std::string> &words)
+ {
+- if (words[0] == u8"PATHNAME" && words.size () == 2)
++ if (words[0] == (const char *) u8"PATHNAME" && words.size () == 2)
+ return Packet (Client::PC_PATHNAME, std::move (words[1]));
+
+ return Packet (Client::PC_ERROR, u8"");
+@@ -256,7 +258,7 @@ Packet PathnameResponse (std::vector<std::string> &words)
+ // OK or ERROR
+ Packet OKResponse (std::vector<std::string> &words)
+ {
+- if (words[0] == u8"OK")
++ if (words[0] == (const char *) u8"OK")
+ return Packet (Client::PC_OK);
+ else
+ return Packet (Client::PC_ERROR,
+@@ -319,11 +321,11 @@ Packet Client::IncludeTranslate (char const *include, Flags flags, size_t ilen)
+ // PATHNAME $cmifile
+ Packet IncludeTranslateResponse (std::vector<std::string> &words)
+ {
+- if (words[0] == u8"BOOL" && words.size () == 2)
++ if (words[0] == (const char *) u8"BOOL" && words.size () == 2)
+ {
+- if (words[1] == u8"FALSE")
+- return Packet (Client::PC_BOOL, 0);
+- else if (words[1] == u8"TRUE")
++ if (words[1] == (const char *) u8"FALSE")
++ return Packet (Client::PC_BOOL);
++ else if (words[1] == (const char *) u8"TRUE")
+ return Packet (Client::PC_BOOL, 1);
+ else
+ return Packet (Client::PC_ERROR, u8"");
+diff --git a/libcody/cody.hh b/libcody/cody.hh
+index 789ce9e70b75..93bce93aa94d 100644
+--- a/libcody/cody.hh
++++ b/libcody/cody.hh
+@@ -47,12 +47,21 @@ namespace Detail {
+
+ // C++11 doesn't have utf8 character literals :(
+
++#if __cpp_char8_t >= 201811
++template<unsigned I>
++constexpr char S2C (char8_t const (&s)[I])
++{
++ static_assert (I == 2, "only single octet strings may be converted");
++ return s[0];
++}
++#else
+ template<unsigned I>
+ constexpr char S2C (char const (&s)[I])
+ {
+ static_assert (I == 2, "only single octet strings may be converted");
+ return s[0];
+ }
++#endif
+
+ /// Internal buffering class. Used to concatenate outgoing messages
+ /// and Lex incoming ones.
+@@ -123,6 +132,13 @@ public:
+ Space ();
+ Append (str, maybe_quote, len);
+ }
++#if __cpp_char8_t >= 201811
++ void AppendWord (char8_t const *str, bool maybe_quote = false,
++ size_t len = ~size_t (0))
++ {
++ AppendWord ((const char *) str, maybe_quote, len);
++ }
++#endif
+ /// Add a word as with AppendWord
+ /// @param str the string to append
+ /// @param maybe_quote string might need quoting, as for Append
+@@ -264,6 +280,12 @@ public:
+ : string (s), cat (STRING), code (c)
+ {
+ }
++#if __cpp_char8_t >= 201811
++ Packet (unsigned c, const char8_t *s)
++ : string ((const char *) s), cat (STRING), code (c)
++ {
++ }
++#endif
+ Packet (unsigned c, std::vector<std::string> &&v)
+ : vector (std::move (v)), cat (VECTOR), code (c)
+ {
+diff --git a/libcody/server.cc b/libcody/server.cc
+index e2fa069bb933..c18469fae843 100644
+--- a/libcody/server.cc
++++ b/libcody/server.cc
+@@ -36,12 +36,12 @@ static RequestPair
+ const requestTable[Detail::RC_HWM] =
+ {
+ // Same order as enum RequestCode
+- RequestPair {u8"HELLO", nullptr},
+- RequestPair {u8"MODULE-REPO", ModuleRepoRequest},
+- RequestPair {u8"MODULE-EXPORT", ModuleExportRequest},
+- RequestPair {u8"MODULE-IMPORT", ModuleImportRequest},
+- RequestPair {u8"MODULE-COMPILED", ModuleCompiledRequest},
+- RequestPair {u8"INCLUDE-TRANSLATE", IncludeTranslateRequest},
++ RequestPair {(const char *) u8"HELLO", nullptr},
++ RequestPair {(const char *) u8"MODULE-REPO", ModuleRepoRequest},
++ RequestPair {(const char *) u8"MODULE-EXPORT", ModuleExportRequest},
++ RequestPair {(const char *) u8"MODULE-IMPORT", ModuleImportRequest},
++ RequestPair {(const char *) u8"MODULE-COMPILED", ModuleCompiledRequest},
++ RequestPair {(const char *) u8"INCLUDE-TRANSLATE", IncludeTranslateRequest},
+ };
+ }
+
+@@ -135,21 +135,21 @@ void Server::ProcessRequests (void)
+ std::string msg;
+
+ if (err > 0)
+- msg = u8"error processing '";
++ msg = (const char *) u8"error processing '";
+ else if (ix >= Detail::RC_HWM)
+- msg = u8"unrecognized '";
++ msg = (const char *) u8"unrecognized '";
+ else if (IsConnected () && ix == Detail::RC_CONNECT)
+- msg = u8"already connected '";
++ msg = (const char *) u8"already connected '";
+ else if (!IsConnected () && ix != Detail::RC_CONNECT)
+- msg = u8"not connected '";
++ msg = (const char *) u8"not connected '";
+ else
+- msg = u8"malformed '";
++ msg = (const char *) u8"malformed '";
+
+ read.LexedLine (msg);
+- msg.append (u8"'");
++ msg.append ((const char *) u8"'");
+ if (err > 0)
+ {
+- msg.append (u8" ");
++ msg.append ((const char *) u8" ");
+ msg.append (strerror (err));
+ }
+ resolver->ErrorResponse (this, std::move (msg));
+@@ -176,7 +176,7 @@ Resolver *ConnectRequest (Server *s, Resolver *r,
+ return nullptr;
+
+ if (words.size () == 3)
+- words.emplace_back (u8"");
++ words.emplace_back ((const char *) u8"");
+ unsigned version = ParseUnsigned (words[1]);
+ if (version == ~0u)
+ return nullptr;
diff --git a/meta/recipes-devtools/gcc/gcc/0029-build-Remove-INCLUDE_MEMORY-PR117737.patch b/meta/recipes-devtools/gcc/gcc/0029-build-Remove-INCLUDE_MEMORY-PR117737.patch
new file mode 100644
index 00000000000..d784edefd76
--- /dev/null
+++ b/meta/recipes-devtools/gcc/gcc/0029-build-Remove-INCLUDE_MEMORY-PR117737.patch
@@ -0,0 +1,46 @@
+From b3f1b9e2aa079f8ec73e3cb48143a16645c49566 Mon Sep 17 00:00:00 2001
+From: Andrew Pinski <quic_apinski@quicinc.com>
+Date: Fri, 22 Nov 2024 09:31:44 -0800
+Subject: [PATCH] build: Remove INCLUDE_MEMORY [PR117737]
+
+Since diagnostic.h is included in over half of the sources, requiring to `#define INCLUDE_MEMORY`
+does not make sense. Instead lets unconditionally include memory in system.h.
+
+The majority of this patch is just removing `#define INCLUDE_MEMORY` from the sources which currently
+have it.
+
+This should also fix the mingw build issue but I have not tried it.
+
+Signed-off-by: Andrew Pinski <quic_apinski@quicinc.com>
+Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
+Upstream-Status: Backport [gcc-15.1.0 b3f1b9e2aa07 partial, only the gcc/system.h change]
+---
+ gcc/system.h | 8 +-------
+ 1 file changed, 1 insertion(+), 7 deletions(-)
+
+diff --git a/gcc/system.h b/gcc/system.h
+index c18c7c5ec58d..c209871df72d 100644
+--- a/gcc/system.h
++++ b/gcc/system.h
+@@ -222,6 +222,7 @@ extern int fprintf_unlocked (FILE *, const char *, ...);
+ #ifdef INCLUDE_FUNCTIONAL
+ # include <functional>
+ #endif
++# include <memory>
+ # include <cstring>
+ # include <initializer_list>
+ # include <new>
+@@ -758,13 +759,6 @@ private:
+ #define LIKELY(x) (__builtin_expect ((x), 1))
+ #define UNLIKELY(x) (__builtin_expect ((x), 0))
+
+-/* Some of the headers included by <memory> can use "abort" within a
+- namespace, e.g. "_VSTD::abort();", which fails after we use the
+- preprocessor to redefine "abort" as "fancy_abort" below. */
+-
+-#ifdef INCLUDE_MEMORY
+-# include <memory>
+-#endif
+
+ #ifdef INCLUDE_MUTEX
+ # include <mutex>
diff --git a/meta/recipes-devtools/gcc/gcc/0030-build-Move-sstream-include-above-safe-ctype.h-PR1177.patch b/meta/recipes-devtools/gcc/gcc/0030-build-Move-sstream-include-above-safe-ctype.h-PR1177.patch
new file mode 100644
index 00000000000..270c91c345b
--- /dev/null
+++ b/meta/recipes-devtools/gcc/gcc/0030-build-Move-sstream-include-above-safe-ctype.h-PR1177.patch
@@ -0,0 +1,54 @@
+From ac90b5c413c1565fb37cf79b92f6859b3852254a Mon Sep 17 00:00:00 2001
+From: Andrew Pinski <quic_apinski@quicinc.com>
+Date: Mon, 25 Nov 2024 14:03:27 -0800
+Subject: [PATCH] build: Move sstream include above safe-ctype.h {PR117771]
+
+sstream in some versions of libstdc++ include locale which might not have been
+included yet. safe-ctype.h defines the toupper, tolower, etc. as macros so the
+c++ header files needed to be included before hand as comment in system.h says:
+/* Include C++ standard headers before "safe-ctype.h" to avoid GCC
+ poisoning the ctype macros through safe-ctype.h */
+
+I don't understand how it was working before when memory was included after
+safe-ctype.h rather than before. But this makes sstream consistent with the
+other C++ headers.
+
+Pushed as obvious after a build for riscv64-elf.
+
+gcc/ChangeLog:
+
+ PR target/117771
+ * system.h: Move the include of sstream above safe-ctype.h.
+
+Signed-off-by: Andrew Pinski <quic_apinski@quicinc.com>
+Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
+Upstream-Status: Backport [gcc-15.1.0 f6e00226a4ca63e76e3e0b3a09a4ce6223980981]
+---
+ gcc/system.h | 7 +++----
+ 1 file changed, 3 insertions(+), 4 deletions(-)
+
+diff --git a/gcc/system.h b/gcc/system.h
+index 33245e76a986..ff983986153c 100644
+--- a/gcc/system.h
++++ b/gcc/system.h
+@@ -222,6 +222,9 @@ extern int fprintf_unlocked (FILE *, const char *, ...);
+ #ifdef INCLUDE_FUNCTIONAL
+ # include <functional>
+ #endif
++#ifdef INCLUDE_SSTREAM
++# include <sstream>
++#endif
+ # include <memory>
+ # include <cstring>
+ # include <initializer_list>
+@@ -742,10 +745,6 @@ extern int vsnprintf (char *, size_t, const char *, va_list);
+ # include <mutex>
+ #endif
+
+-#ifdef INCLUDE_SSTREAM
+-# include <sstream>
+-#endif
+-
+ #ifdef INCLUDE_MALLOC_H
+ #if defined(HAVE_MALLINFO) || defined(HAVE_MALLINFO2)
+ #include <malloc.h>
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 32/66] libxcrypt: avoid discarded-qualifiers build failure with glibc 2.43
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (30 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 31/66] gcc: backport a fix for building with gcc-16 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 33/66] libxcrypt: Fix build wrt C23 support Yoann Congal
` (33 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Hemanth Kumar M D <Hemanth.KumarMD@windriver.com>
With the glibc 2.43 upgrade, building nativesdk-libxcrypt triggers a
-Wdiscarded-qualifiers warning in crypt-gost-yescrypt.c and
crypt-sm3-yescrypt.c which becomes a build failure due to -Werror.
Signed-off-by: Hemanth Kumar M D <Hemanth.KumarMD@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 8340d4be03646f0b4b599f768ddc88f502f93615)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-core/libxcrypt/libxcrypt.inc | 1 +
1 file changed, 1 insertion(+)
diff --git a/meta/recipes-core/libxcrypt/libxcrypt.inc b/meta/recipes-core/libxcrypt/libxcrypt.inc
index ee6875aa05d..11ec87c14e8 100644
--- a/meta/recipes-core/libxcrypt/libxcrypt.inc
+++ b/meta/recipes-core/libxcrypt/libxcrypt.inc
@@ -23,6 +23,7 @@ S = "${WORKDIR}/git"
BUILD_CPPFLAGS = "-I${STAGING_INCDIR_NATIVE}"
TARGET_CPPFLAGS = "-I${STAGING_DIR_TARGET}${includedir} -Wno-error"
CPPFLAGS:append:class-nativesdk = " -Wno-error"
+CFLAGS:append:class-nativesdk = " -Wno-error=discarded-qualifiers"
API = "--disable-obsolete-api"
EXTRA_OECONF += "${API}"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 33/66] libxcrypt: Fix build wrt C23 support
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (31 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 32/66] libxcrypt: avoid discarded-qualifiers build failure with glibc 2.43 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 34/66] libxcrypt: Use configure knob to disable warnings as errors Yoann Congal
` (32 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Khem Raj <raj.khem@gmail.com>
latest glibc has better C23 support and exposes this problem
Fixes following errors seen in nativesdk-libxcrypt
| ../sources/libxcrypt-4.5.2/lib/crypt-sm3-yescrypt.c:139:9: error: initializing 'char *' with an expression of type 'const char *' discards qualifiers [-Werror,-Wincompatible-pointer-types-discards-qualifiers]
| 139 | char *hptr = strchr ((const char *) intbuf->retval + 3, '$');
| | ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
| 6 errors generated.
Compared to wrynose remove lib/crypt-sm3-yescrypt.c change, because
the file doesn't exist in the version used in scarthgap, it was failing
only in lib/crypt-gost-yescrypt.c
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit a666b8e71ecda97db58c90d5af137671f9823f38)
[YC: fixed patch format]
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
...24d6e87aeae631bc0a7bb1ba983cf8def4de.patch | 29 +++++++++++++++++++
meta/recipes-core/libxcrypt/libxcrypt.inc | 4 ++-
2 files changed, 32 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch
diff --git a/meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch b/meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch
new file mode 100644
index 00000000000..75749c054a2
--- /dev/null
+++ b/meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch
@@ -0,0 +1,29 @@
+From 174c24d6e87aeae631bc0a7bb1ba983cf8def4de Mon Sep 17 00:00:00 2001
+From: Stanislav Zidek <szidek@redhat.com>
+Date: Wed, 10 Dec 2025 14:03:54 +0100
+Subject: [PATCH] fix -Werror=discarded-qualifiers
+
+On Fedora rawhide (to be Fedora 44), gcc became more strict
+wrt. const-ness.
+
+Upstream-Status: Backport [https://github.com/besser82/libxcrypt/pull/220 without lib/crypt-sm3-yescrypt.c]
+Signed-off-by: Khem Raj <raj.khem@gmail.com>
+
+---
+ lib/crypt-gost-yescrypt.c | 2 +-
+ lib/crypt-sm3-yescrypt.c | 2 +-
+ 2 files changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/lib/crypt-gost-yescrypt.c b/lib/crypt-gost-yescrypt.c
+index 190ae94b..e9dc7e80 100644
+--- a/lib/crypt-gost-yescrypt.c
++++ b/lib/crypt-gost-yescrypt.c
+@@ -131,7 +131,7 @@ crypt_gost_yescrypt_rn (const char *phrase, size_t phr_size,
+ intbuf->outbuf[1] = 'g';
+
+ /* extract yescrypt output from "$y$param$salt$output" */
+- char *hptr = strchr ((const char *) intbuf->retval + 3, '$');
++ char *hptr = strchr ((char *) intbuf->retval + 3, '$');
+ if (!hptr)
+ {
+ errno = EINVAL;
diff --git a/meta/recipes-core/libxcrypt/libxcrypt.inc b/meta/recipes-core/libxcrypt/libxcrypt.inc
index 11ec87c14e8..4e240f4d145 100644
--- a/meta/recipes-core/libxcrypt/libxcrypt.inc
+++ b/meta/recipes-core/libxcrypt/libxcrypt.inc
@@ -9,7 +9,9 @@ LIC_FILES_CHKSUM = "file://LICENSING;md5=c0a30e2b1502c55a7f37e412cd6c6a4b \
inherit autotools pkgconfig
-SRC_URI = "git://github.com/besser82/libxcrypt.git;branch=${SRCBRANCH};protocol=https"
+SRC_URI = "git://github.com/besser82/libxcrypt.git;branch=${SRCBRANCH};protocol=https \
+ file://174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch \
+"
SRCREV = "f531a36aa916a22ef2ce7d270ba381e264250cbf"
SRCBRANCH ?= "master"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 34/66] libxcrypt: Use configure knob to disable warnings as errors
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (32 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 33/66] libxcrypt: Fix build wrt C23 support Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 35/66] spirv-tools: backport a fix for building with gcc-16 Yoann Congal
` (31 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Khem Raj <raj.khem@gmail.com>
Passing Wno-error via environment flags for target and nativesdk
is intended but is not effective due to command line ordering and
as a result some patches have been added to disable particular kind
of warning as error. Given the scenario, warnings as errors should
be disabled for all builds, this makes it portable across hosts and
across compilers ( gcc, clang ) and glibc versions.
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 25f26861ddc8d71af5381d1acc883ad948bddace)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-core/libxcrypt/libxcrypt.inc | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/meta/recipes-core/libxcrypt/libxcrypt.inc b/meta/recipes-core/libxcrypt/libxcrypt.inc
index 4e240f4d145..25c4fde813b 100644
--- a/meta/recipes-core/libxcrypt/libxcrypt.inc
+++ b/meta/recipes-core/libxcrypt/libxcrypt.inc
@@ -23,9 +23,9 @@ PROVIDES = "virtual/crypt"
S = "${WORKDIR}/git"
BUILD_CPPFLAGS = "-I${STAGING_INCDIR_NATIVE}"
-TARGET_CPPFLAGS = "-I${STAGING_DIR_TARGET}${includedir} -Wno-error"
-CPPFLAGS:append:class-nativesdk = " -Wno-error"
-CFLAGS:append:class-nativesdk = " -Wno-error=discarded-qualifiers"
+TARGET_CPPFLAGS = "-I${STAGING_DIR_TARGET}${includedir}"
+
+EXTRA_OECONF += "--disable-werror"
API = "--disable-obsolete-api"
EXTRA_OECONF += "${API}"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 35/66] spirv-tools: backport a fix for building with gcc-16
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (33 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 34/66] libxcrypt: Use configure knob to disable warnings as errors Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 36/66] ca-certificates: upgrade 20250419 -> 20260223 Yoann Congal
` (30 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Martin Jansa <martin.jansa@gmail.com>
Fixes:
https://errors.yoctoproject.org/Errors/Details/905195/
when building on host with gcc-16
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit b4801e63d1284f3fa5006f0e24f560130c2a0a4c)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
...sue-with-gcc-16-replaeces-PR-6542-65.patch | 50 +++++++++++++++++++
.../spir/spirv-tools_1.3.275.0.bb | 4 +-
2 files changed, 53 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch
diff --git a/meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch b/meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch
new file mode 100644
index 00000000000..ce58b6b8c0f
--- /dev/null
+++ b/meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch
@@ -0,0 +1,50 @@
+From aab5c96b7eb237b8bcd15e28f8aff068842db4b7 Mon Sep 17 00:00:00 2001
+From: David Neto <dneto@google.com>
+Date: Tue, 3 Mar 2026 12:11:47 -0500
+Subject: [PATCH] opt: Fix build issue with gcc 16 (replaeces PR #6542)
+ (#6567)
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+Compiling with gcc 16 throws this error:
+
+FAILED: [code=1]
+source/opt/CMakeFiles/SPIRV-Tools-opt.dir/decoration_manager.cpp.o
+ source/opt/decoration_manager.cpp: In member function
+‘spvtools::opt::analysis::DecorationManager::CloneDecorations(unsigned
+int, unsigned int)’:
+ source/opt/decoration_manager.cpp:546:27: error:
+‘MEM[(unsigned int &)&op + 24]’ may be used uninitialized
+[-Werror=maybe-uninitialized]
+
+546 | if (op.words[0] == from) { // add new pair of operands: (to,
+literal)
+ source/opt/decoration_manager.cpp:545:19: note: ‘op’ declared here
+ 545 | Operand op = inst->GetOperand(i);
+ | ^~
+ cc1plus: all warnings being treated as errors
+
+Make sure that the vector is not empty before using it.
+
+Co-authored-by: José Expósito <jose.exposito89@gmail.com>
+Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
+Upstream-Status: Backport [c28f5937bce369dde1d645299a8c9873da43dc72]
+---
+ source/opt/decoration_manager.cpp | 3 ++-
+ 1 file changed, 2 insertions(+), 1 deletion(-)
+
+diff --git a/source/opt/decoration_manager.cpp b/source/opt/decoration_manager.cpp
+index 3e95dbc35..bee7d9482 100644
+--- a/source/opt/decoration_manager.cpp
++++ b/source/opt/decoration_manager.cpp
+@@ -543,7 +543,8 @@ void DecorationManager::CloneDecorations(uint32_t from, uint32_t to) {
+ const uint32_t num_operands = inst->NumOperands();
+ for (uint32_t i = 1; i < num_operands; i += 2) {
+ Operand op = inst->GetOperand(i);
+- if (op.words[0] == from) { // add new pair of operands: (to, literal)
++ if (!op.words.empty() &&
++ op.words[0] == from) { // add new pair of operands: (to, literal)
+ inst->AddOperand(
+ Operand(spv_operand_type_t::SPV_OPERAND_TYPE_ID, {to}));
+ op = inst->GetOperand(i + 1);
diff --git a/meta/recipes-graphics/spir/spirv-tools_1.3.275.0.bb b/meta/recipes-graphics/spir/spirv-tools_1.3.275.0.bb
index 05c6de1b500..027fa4f9c99 100644
--- a/meta/recipes-graphics/spir/spirv-tools_1.3.275.0.bb
+++ b/meta/recipes-graphics/spir/spirv-tools_1.3.275.0.bb
@@ -8,7 +8,9 @@ LICENSE = "Apache-2.0"
LIC_FILES_CHKSUM = "file://LICENSE;md5=3b83ef96387f14655fc854ddc3c6bd57"
SRCREV = "f0cc85efdbbe3a46eae90e0f915dc1509836d0fc"
-SRC_URI = "git://github.com/KhronosGroup/SPIRV-Tools.git;branch=main;protocol=https"
+SRC_URI = "git://github.com/KhronosGroup/SPIRV-Tools.git;branch=main;protocol=https \
+ file://0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch \
+"
PE = "1"
# These recipes need to be updated in lockstep with each other:
# glslang, vulkan-headers, vulkan-loader, vulkan-tools, spirv-headers, spirv-tools
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 36/66] ca-certificates: upgrade 20250419 -> 20260223
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (34 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 35/66] spirv-tools: backport a fix for building with gcc-16 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 37/66] ovmf: backport a fix for build with gcc-16 Yoann Congal
` (29 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Andrej Kozemcak <andrej.kozemcak@siemens.com>
Changelog:
* Update Mozilla certificate authority bundle to version 2.82
The following certificate authorities were added (+):
+ TrustAsia TLS ECC Root CA
+ TrustAsia TLS RSA Root CA
+ SwissSign RSA TLS Root CA 2022 - 1
+ OISTE Server Root ECC G1
+ OISTE Server Root RSA G1
The following certificate authorities were removed (-):
- GlobalSign Root CA
- Entrust.net Premium 2048 Secure Server CA
- Baltimore CyberTrust Root (closes: #1121936)
- Comodo AAA Services root
- XRamp Global CA Root
- Go Daddy Class 2 CA
- Starfield Class 2 CA
- CommScope Public Trust ECC Root-01
- CommScope Public Trust ECC Root-02
- CommScope Public Trust RSA Root-01
- CommScope Public Trust RSA Root-02
* Use dh_usrlocal to create /usr/local/share/ca-certificates
Signed-off-by: Andrej Kozemcak <andrej.kozemcak@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 738e08718e31de19c1c8db5e162a4a00e2b0c0e6)
Signed-off-by: Ankur Tyagi <ankur.tyagi85@gmail.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
...{ca-certificates_20250419.bb => ca-certificates_20260223.bb} | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-support/ca-certificates/{ca-certificates_20250419.bb => ca-certificates_20260223.bb} (97%)
diff --git a/meta/recipes-support/ca-certificates/ca-certificates_20250419.bb b/meta/recipes-support/ca-certificates/ca-certificates_20260223.bb
similarity index 97%
rename from meta/recipes-support/ca-certificates/ca-certificates_20250419.bb
rename to meta/recipes-support/ca-certificates/ca-certificates_20260223.bb
index 01f594095e9..9cf6d5afc7d 100644
--- a/meta/recipes-support/ca-certificates/ca-certificates_20250419.bb
+++ b/meta/recipes-support/ca-certificates/ca-certificates_20260223.bb
@@ -14,7 +14,7 @@ DEPENDS:class-nativesdk = "openssl-native"
# Need rehash from openssl and run-parts from debianutils
PACKAGE_WRITE_DEPS += "openssl-native debianutils-native"
-SRC_URI[sha256sum] = "33b44ef78653ecd3f0f2f13e5bba6be466be2e7da72182f737912b81798ba5d2"
+SRC_URI[sha256sum] = "2fa2b00d4360f0d14ec51640ae8aea9e563956b95ea786e3c3c01c4eead42b56"
SRC_URI = "${DEBIAN_MIRROR}/main/c/ca-certificates/${BPN}_${PV}.tar.xz \
file://0001-update-ca-certificates-don-t-use-Debianisms-in-run-p.patch \
file://0003-update-ca-certificates-use-relative-symlinks-from-ET.patch \
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 37/66] ovmf: backport a fix for build with gcc-16
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (35 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 36/66] ca-certificates: upgrade 20250419 -> 20260223 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 21:15 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 38/66] ltp: fix epoll_ctl04 failed Yoann Congal
` (28 subsequent siblings)
65 siblings, 1 reply; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Martin Jansa <martin.jansa@gmail.com>
Fixes build on host with gcc-16:
StringFuncs.c: In function ‘SplitStringByWhitespace’:
StringFuncs.c:113:15: error: variable ‘Item’ set but not used [-Werror=unused-but-set-variable=]
113 | UINTN Item;
| ^~~~
and
EfiRom.c: In function ‘main’:
EfiRom.c:78:17: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers]
78 | if ((Ptr0 = strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION)) != NULL) {
| ^
and one more for older version used in scarthgap
main.c: In function ‘ProcessArgs’:
main.c:163:42: error: too many arguments to function ‘p->process’; expected 0, have 2
163 | (*p->process)( *argv, *(argv+1) );
| ~^~~~~~~~~~~~ ~~~~~
main.c:120:34: note: declared here
120 | WildFunc process;
| ^~~~~~~
main.c:168:42: error: too many arguments to function ‘p->process’; expected 0, have 1
168 | (*p->process)( *argv );
| ~^~~~~~~~~~~~ ~~~~~
main.c:120:34: note: declared here
120 | WildFunc process;
| ^~~~~~~
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
[YC: upstream commit a1db482ecd2824a4ae67a3c2a8e607b607ab4a43]
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
...Tools-StringFuncs-fix-gcc-16-warning.patch | 42 ++++++++++++++++++
...aseTools-EfiRom-fix-compiler-warning.patch | 44 +++++++++++++++++++
.../0008-BaseTools-Pccts-set-C-standard.patch | 44 +++++++++++++++++++
meta/recipes-core/ovmf/ovmf_git.bb | 3 ++
4 files changed, 133 insertions(+)
create mode 100644 meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch
create mode 100644 meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch
create mode 100644 meta/recipes-core/ovmf/ovmf/0008-BaseTools-Pccts-set-C-standard.patch
diff --git a/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch b/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch
new file mode 100644
index 00000000000..a465dede9c3
--- /dev/null
+++ b/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch
@@ -0,0 +1,42 @@
+From 015c26aea52a54e96319887ea542870b4804fb91 Mon Sep 17 00:00:00 2001
+From: Gerd Hoffmann <kraxel@redhat.com>
+Date: Thu, 29 Jan 2026 09:23:32 +0100
+Subject: [PATCH] BaseTools/StringFuncs: fix gcc 16 warning
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+StringFuncs.c: In function ‘SplitStringByWhitespace’:
+StringFuncs.c:113:15: error: variable ‘Item’ set but not used [-Werror=unused-but-set-variable=]
+ 113 | UINTN Item;
+ | ^~~~
+
+Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
+
+Upstream-Status: Backport [edk2-stable202602 https://github.com/tianocore/edk2/commit/3597306191297b504683b83fe7750e49c6a2e836]
+Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
+---
+ BaseTools/Source/C/Common/StringFuncs.c | 3 +--
+ 1 file changed, 1 insertion(+), 2 deletions(-)
+
+diff --git a/BaseTools/Source/C/Common/StringFuncs.c b/BaseTools/Source/C/Common/StringFuncs.c
+index 53e44365e9..df02d9c808 100644
+--- a/BaseTools/Source/C/Common/StringFuncs.c
++++ b/BaseTools/Source/C/Common/StringFuncs.c
+@@ -110,7 +110,6 @@ SplitStringByWhitespace (
+ CHAR8 *EndOfSubString;
+ CHAR8 *EndOfString;
+ STRING_LIST *Output;
+- UINTN Item;
+
+ String = CloneString (String);
+ if (String == NULL) {
+@@ -120,7 +119,7 @@ SplitStringByWhitespace (
+
+ Output = NewStringList ();
+
+- for (Pos = String, Item = 0; Pos < EndOfString; Item++) {
++ for (Pos = String; Pos < EndOfString;) {
+ while (isspace ((int)*Pos)) {
+ Pos++;
+ }
diff --git a/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch b/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch
new file mode 100644
index 00000000000..7aaafe6efbf
--- /dev/null
+++ b/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch
@@ -0,0 +1,44 @@
+From 4d2bdadcd6d45f6708b1b4827b0dc9b6e4b8edd2 Mon Sep 17 00:00:00 2001
+From: Gerd Hoffmann <kraxel@redhat.com>
+Date: Mon, 8 Dec 2025 10:28:50 +0100
+Subject: [PATCH] BaseTools/EfiRom: fix compiler warning
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+New warning after updating gcc:
+
+EfiRom.c: In function ‘main’:
+EfiRom.c:78:17: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers]
+
+The assigned value is not used, so fix the warning by just removing it.
+
+Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
+
+Upstream-Status: Backport [edk2-stable202602 https://github.com/tianocore/edk2/commit/9af06ef3cbb052b142f9660c2c01e7aeb401300c]
+Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
+---
+ BaseTools/Source/C/EfiRom/EfiRom.c | 3 +--
+ 1 file changed, 1 insertion(+), 2 deletions(-)
+
+diff --git a/BaseTools/Source/C/EfiRom/EfiRom.c b/BaseTools/Source/C/EfiRom/EfiRom.c
+index fa7bf0e62e..6e903b3504 100644
+--- a/BaseTools/Source/C/EfiRom/EfiRom.c
++++ b/BaseTools/Source/C/EfiRom/EfiRom.c
+@@ -44,7 +44,6 @@ Returns:
+ FILE_LIST *FList;
+ UINT32 TotalSize;
+ UINT32 Size;
+- CHAR8 *Ptr0;
+
+ SetUtilityName(UTILITY_NAME);
+
+@@ -75,7 +74,7 @@ Returns:
+ //
+ if (mOptions.DumpOption == 1) {
+ if (mOptions.FileList != NULL) {
+- if ((Ptr0 = strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION)) != NULL) {
++ if (strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION) != NULL) {
+ DumpImage (mOptions.FileList);
+ goto BailOut;
+ } else {
diff --git a/meta/recipes-core/ovmf/ovmf/0008-BaseTools-Pccts-set-C-standard.patch b/meta/recipes-core/ovmf/ovmf/0008-BaseTools-Pccts-set-C-standard.patch
new file mode 100644
index 00000000000..de4ccb8a47d
--- /dev/null
+++ b/meta/recipes-core/ovmf/ovmf/0008-BaseTools-Pccts-set-C-standard.patch
@@ -0,0 +1,44 @@
+From 74bc6545e72707a47dd9dae42ce33b8877b10000 Mon Sep 17 00:00:00 2001
+From: Gerd Hoffmann <kraxel@redhat.com>
+Date: Mon, 20 Jan 2025 09:40:31 +0100
+Subject: [PATCH] BaseTools/Pccts: set C standard
+
+The prehistoric code base doesn't build with ISO C23. Set the C
+standard to C11 (for both clang and gcc) so it continues to build with
+gcc 15 (which uses C23 by default).
+
+Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
+
+Upstream-Status: Backport [edk2-stable202502 https://github.com/tianocore/edk2/commit/e063f8b8a53861043b9872cc35b08a3dc03b0942]
+Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
+---
+ BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile | 2 +-
+ BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile | 2 +-
+ 2 files changed, 2 insertions(+), 2 deletions(-)
+
+diff --git a/BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile b/BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile
+index 746d58b5e2..b47c8a37af 100644
+--- a/BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile
++++ b/BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile
+@@ -169,7 +169,7 @@ ANTLR=${BIN_DIR}/antlr
+ DLG=${BIN_DIR}/dlg
+ OBJ_EXT=o
+ OUT_OBJ = -o
+-CFLAGS= $(COPT) -I. -I$(SET) -I$(PCCTS_H) -DUSER_ZZSYN $(COTHER) -DZZLEXBUFSIZE=65536
++CFLAGS= $(COPT) -I. -I$(SET) -I$(PCCTS_H) -DUSER_ZZSYN $(COTHER) -DZZLEXBUFSIZE=65536 -std=gnu11
+ CPPFLAGS=
+ #
+ # SGI Users, use this CFLAGS
+diff --git a/BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile b/BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile
+index e45ac98e04..d72bee3d70 100644
+--- a/BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile
++++ b/BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile
+@@ -123,7 +123,7 @@ endif
+ COPT=-O
+ ANTLR=${BIN_DIR}/antlr
+ DLG=${BIN_DIR}/dlg
+-CFLAGS= $(COPT) -I. -I$(SET) -I$(PCCTS_H) -DUSER_ZZSYN -DZZLEXBUFSIZE=65536
++CFLAGS= $(COPT) -I. -I$(SET) -I$(PCCTS_H) -DUSER_ZZSYN -DZZLEXBUFSIZE=65536 -std=gnu11
+ CPPFLAGS=
+ OBJ_EXT=o
+ OUT_OBJ = -o
diff --git a/meta/recipes-core/ovmf/ovmf_git.bb b/meta/recipes-core/ovmf/ovmf_git.bb
index 319f03a8d2a..badde30d97e 100644
--- a/meta/recipes-core/ovmf/ovmf_git.bb
+++ b/meta/recipes-core/ovmf/ovmf_git.bb
@@ -26,6 +26,9 @@ SRC_URI = "gitsm://github.com/tianocore/edk2.git;branch=master;protocol=https \
file://0004-reproducible.patch \
file://0001-MdePkg-Fix-overflow-issue-in-BasePeCoffLib.patch \
file://0001-MdeModulePkg-Potential-UINT32-overflow-in-S3-ResumeC.patch \
+ file://0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch \
+ file://0007-BaseTools-EfiRom-fix-compiler-warning.patch \
+ file://0008-BaseTools-Pccts-set-C-standard.patch \
"
PV = "edk2-stable202402"
^ permalink raw reply related [flat|nested] 69+ messages in thread* Re: [OE-core][scarthgap 37/66] ovmf: backport a fix for build with gcc-16
2026-04-24 20:55 ` [OE-core][scarthgap 37/66] ovmf: backport a fix for build with gcc-16 Yoann Congal
@ 2026-04-24 21:15 ` Yoann Congal
0 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 21:15 UTC (permalink / raw)
To: Yoann Congal, openembedded-core
On Fri Apr 24, 2026 at 10:55 PM CEST, Yoann Congal wrote:
> From: Martin Jansa <martin.jansa@gmail.com>
>
> Fixes build on host with gcc-16:
>
> StringFuncs.c: In function ‘SplitStringByWhitespace’:
> StringFuncs.c:113:15: error: variable ‘Item’ set but not used [-Werror=unused-but-set-variable=]
> 113 | UINTN Item;
> | ^~~~
>
> and
>
> EfiRom.c: In function ‘main’:
> EfiRom.c:78:17: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers]
> 78 | if ((Ptr0 = strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION)) != NULL) {
> | ^
>
> and one more for older version used in scarthgap
>
> main.c: In function ‘ProcessArgs’:
> main.c:163:42: error: too many arguments to function ‘p->process’; expected 0, have 2
> 163 | (*p->process)( *argv, *(argv+1) );
> | ~^~~~~~~~~~~~ ~~~~~
> main.c:120:34: note: declared here
> 120 | WildFunc process;
> | ^~~~~~~
> main.c:168:42: error: too many arguments to function ‘p->process’; expected 0, have 1
> 168 | (*p->process)( *argv );
> | ~^~~~~~~~~~~~ ~~~~~
> main.c:120:34: note: declared here
> 120 | WildFunc process;
> | ^~~~~~~
>
> Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
> [YC: upstream commit a1db482ecd2824a4ae67a3c2a8e607b607ab4a43]
> Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
This patch contains weird line endings and might fail to apply when
using mails.
You will find it on my branch here:
ovmf: backport a fix for build with gcc-16 - openembedded-core-contrib - OpenEmbedded Core user contribution trees
https://git.openembedded.org/openembedded-core-contrib/commit/?h=stable/scarthgap-nut&id=7de54889b3547a94bc7c6015731ec1c099e4d629
Regards,
> ---
> ...Tools-StringFuncs-fix-gcc-16-warning.patch | 42 ++++++++++++++++++
> ...aseTools-EfiRom-fix-compiler-warning.patch | 44 +++++++++++++++++++
> .../0008-BaseTools-Pccts-set-C-standard.patch | 44 +++++++++++++++++++
> meta/recipes-core/ovmf/ovmf_git.bb | 3 ++
> 4 files changed, 133 insertions(+)
> create mode 100644 meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch
> create mode 100644 meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch
> create mode 100644 meta/recipes-core/ovmf/ovmf/0008-BaseTools-Pccts-set-C-standard.patch
>
> diff --git a/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch b/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch
> new file mode 100644
> index 00000000000..a465dede9c3
> --- /dev/null
> +++ b/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch
> @@ -0,0 +1,42 @@
> +From 015c26aea52a54e96319887ea542870b4804fb91 Mon Sep 17 00:00:00 2001
> +From: Gerd Hoffmann <kraxel@redhat.com>
> +Date: Thu, 29 Jan 2026 09:23:32 +0100
> +Subject: [PATCH] BaseTools/StringFuncs: fix gcc 16 warning
> +MIME-Version: 1.0
> +Content-Type: text/plain; charset=UTF-8
> +Content-Transfer-Encoding: 8bit
> +
> +StringFuncs.c: In function ‘SplitStringByWhitespace’:
> +StringFuncs.c:113:15: error: variable ‘Item’ set but not used [-Werror=unused-but-set-variable=]
> + 113 | UINTN Item;
> + | ^~~~
> +
> +Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
> +
> +Upstream-Status: Backport [edk2-stable202602 https://github.com/tianocore/edk2/commit/3597306191297b504683b83fe7750e49c6a2e836]
> +Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
> +---
> + BaseTools/Source/C/Common/StringFuncs.c | 3 +--
> + 1 file changed, 1 insertion(+), 2 deletions(-)
> +
> +diff --git a/BaseTools/Source/C/Common/StringFuncs.c b/BaseTools/Source/C/Common/StringFuncs.c
> +index 53e44365e9..df02d9c808 100644
> +--- a/BaseTools/Source/C/Common/StringFuncs.c
> ++++ b/BaseTools/Source/C/Common/StringFuncs.c
> +@@ -110,7 +110,6 @@ SplitStringByWhitespace (
> + CHAR8 *EndOfSubString;
> + CHAR8 *EndOfString;
> + STRING_LIST *Output;
> +- UINTN Item;
> +
> + String = CloneString (String);
> + if (String == NULL) {
> +@@ -120,7 +119,7 @@ SplitStringByWhitespace (
> +
> + Output = NewStringList ();
> +
> +- for (Pos = String, Item = 0; Pos < EndOfString; Item++) {
> ++ for (Pos = String; Pos < EndOfString;) {
> + while (isspace ((int)*Pos)) {
> + Pos++;
> + }
> diff --git a/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch b/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch
> new file mode 100644
> index 00000000000..7aaafe6efbf
> --- /dev/null
> +++ b/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch
> @@ -0,0 +1,44 @@
> +From 4d2bdadcd6d45f6708b1b4827b0dc9b6e4b8edd2 Mon Sep 17 00:00:00 2001
> +From: Gerd Hoffmann <kraxel@redhat.com>
> +Date: Mon, 8 Dec 2025 10:28:50 +0100
> +Subject: [PATCH] BaseTools/EfiRom: fix compiler warning
> +MIME-Version: 1.0
> +Content-Type: text/plain; charset=UTF-8
> +Content-Transfer-Encoding: 8bit
> +
> +New warning after updating gcc:
> +
> +EfiRom.c: In function ‘main’:
> +EfiRom.c:78:17: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers]
> +
> +The assigned value is not used, so fix the warning by just removing it.
> +
> +Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
> +
> +Upstream-Status: Backport [edk2-stable202602 https://github.com/tianocore/edk2/commit/9af06ef3cbb052b142f9660c2c01e7aeb401300c]
> +Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
> +---
> + BaseTools/Source/C/EfiRom/EfiRom.c | 3 +--
> + 1 file changed, 1 insertion(+), 2 deletions(-)
> +
> +diff --git a/BaseTools/Source/C/EfiRom/EfiRom.c b/BaseTools/Source/C/EfiRom/EfiRom.c
> +index fa7bf0e62e..6e903b3504 100644
> +--- a/BaseTools/Source/C/EfiRom/EfiRom.c
> ++++ b/BaseTools/Source/C/EfiRom/EfiRom.c
> +@@ -44,7 +44,6 @@ Returns:
> + FILE_LIST *FList;
> + UINT32 TotalSize;
> + UINT32 Size;
> +- CHAR8 *Ptr0;
> +
> + SetUtilityName(UTILITY_NAME);
> +
> +@@ -75,7 +74,7 @@ Returns:
> + //
> + if (mOptions.DumpOption == 1) {
> + if (mOptions.FileList != NULL) {
> +- if ((Ptr0 = strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION)) != NULL) {
> ++ if (strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION) != NULL) {
> + DumpImage (mOptions.FileList);
> + goto BailOut;
> + } else {
> diff --git a/meta/recipes-core/ovmf/ovmf/0008-BaseTools-Pccts-set-C-standard.patch b/meta/recipes-core/ovmf/ovmf/0008-BaseTools-Pccts-set-C-standard.patch
> new file mode 100644
> index 00000000000..de4ccb8a47d
> --- /dev/null
> +++ b/meta/recipes-core/ovmf/ovmf/0008-BaseTools-Pccts-set-C-standard.patch
> @@ -0,0 +1,44 @@
> +From 74bc6545e72707a47dd9dae42ce33b8877b10000 Mon Sep 17 00:00:00 2001
> +From: Gerd Hoffmann <kraxel@redhat.com>
> +Date: Mon, 20 Jan 2025 09:40:31 +0100
> +Subject: [PATCH] BaseTools/Pccts: set C standard
> +
> +The prehistoric code base doesn't build with ISO C23. Set the C
> +standard to C11 (for both clang and gcc) so it continues to build with
> +gcc 15 (which uses C23 by default).
> +
> +Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
> +
> +Upstream-Status: Backport [edk2-stable202502 https://github.com/tianocore/edk2/commit/e063f8b8a53861043b9872cc35b08a3dc03b0942]
> +Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
> +---
> + BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile | 2 +-
> + BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile | 2 +-
> + 2 files changed, 2 insertions(+), 2 deletions(-)
> +
> +diff --git a/BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile b/BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile
> +index 746d58b5e2..b47c8a37af 100644
> +--- a/BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile
> ++++ b/BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile
> +@@ -169,7 +169,7 @@ ANTLR=${BIN_DIR}/antlr
> + DLG=${BIN_DIR}/dlg
> + OBJ_EXT=o
> + OUT_OBJ = -o
> +-CFLAGS= $(COPT) -I. -I$(SET) -I$(PCCTS_H) -DUSER_ZZSYN $(COTHER) -DZZLEXBUFSIZE=65536
> ++CFLAGS= $(COPT) -I. -I$(SET) -I$(PCCTS_H) -DUSER_ZZSYN $(COTHER) -DZZLEXBUFSIZE=65536 -std=gnu11
> + CPPFLAGS=
> + #
> + # SGI Users, use this CFLAGS
> +diff --git a/BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile b/BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile
> +index e45ac98e04..d72bee3d70 100644
> +--- a/BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile
> ++++ b/BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile
> +@@ -123,7 +123,7 @@ endif
> + COPT=-O
> + ANTLR=${BIN_DIR}/antlr
> + DLG=${BIN_DIR}/dlg
> +-CFLAGS= $(COPT) -I. -I$(SET) -I$(PCCTS_H) -DUSER_ZZSYN -DZZLEXBUFSIZE=65536
> ++CFLAGS= $(COPT) -I. -I$(SET) -I$(PCCTS_H) -DUSER_ZZSYN -DZZLEXBUFSIZE=65536 -std=gnu11
> + CPPFLAGS=
> + OBJ_EXT=o
> + OUT_OBJ = -o
> diff --git a/meta/recipes-core/ovmf/ovmf_git.bb b/meta/recipes-core/ovmf/ovmf_git.bb
> index 319f03a8d2a..badde30d97e 100644
> --- a/meta/recipes-core/ovmf/ovmf_git.bb
> +++ b/meta/recipes-core/ovmf/ovmf_git.bb
> @@ -26,6 +26,9 @@ SRC_URI = "gitsm://github.com/tianocore/edk2.git;branch=master;protocol=https \
> file://0004-reproducible.patch \
> file://0001-MdePkg-Fix-overflow-issue-in-BasePeCoffLib.patch \
> file://0001-MdeModulePkg-Potential-UINT32-overflow-in-S3-ResumeC.patch \
> + file://0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch \
> + file://0007-BaseTools-EfiRom-fix-compiler-warning.patch \
> + file://0008-BaseTools-Pccts-set-C-standard.patch \
> "
>
> PV = "edk2-stable202402"
--
Yoann Congal
Smile ECS
^ permalink raw reply [flat|nested] 69+ messages in thread
* [OE-core][scarthgap 38/66] ltp: fix epoll_ctl04 failed
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (36 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 37/66] ovmf: backport a fix for build with gcc-16 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 39/66] kernel-devsrc: make tools/Build optional Yoann Congal
` (27 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Li Wang <li.wang@windriver.com>
backport from ltp upstream commit:
https://github.com/linux-test-project/ltp/commit/e84f0689cf7a8a77478a0e70aa62560f66c3bceb
the related kernel patch was already merged into yocto linux:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2e467a48287c868818085aa35389a224d226732
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
...l_ctl04-add-ELOOP-to-expected-errnos.patch | 49 +++++++++++++++++++
meta/recipes-extended/ltp/ltp_20240129.bb | 1 +
2 files changed, 50 insertions(+)
create mode 100644 meta/recipes-extended/ltp/ltp/0001-syscalls-epoll_ctl04-add-ELOOP-to-expected-errnos.patch
diff --git a/meta/recipes-extended/ltp/ltp/0001-syscalls-epoll_ctl04-add-ELOOP-to-expected-errnos.patch b/meta/recipes-extended/ltp/ltp/0001-syscalls-epoll_ctl04-add-ELOOP-to-expected-errnos.patch
new file mode 100644
index 00000000000..203836a5f66
--- /dev/null
+++ b/meta/recipes-extended/ltp/ltp/0001-syscalls-epoll_ctl04-add-ELOOP-to-expected-errnos.patch
@@ -0,0 +1,49 @@
+From e84f0689cf7a8a77478a0e70aa62560f66c3bceb Mon Sep 17 00:00:00 2001
+From: Jan Stancek <jstancek@redhat.com>
+Date: Tue, 5 Aug 2025 11:27:23 +0200
+Subject: [PATCH] syscalls/epoll_ctl04: add ELOOP to expected errnos
+
+Kernel commit f2e467a48287 ("eventpoll: Fix semi-unbounded recursion")
+added an extra checks for determining the maximum depth of an upwards walk,
+which starting with 6.17-rc kernels now hits ELOOP before EINVAL.
+
+Add ELOOP to list of expected errnos.
+
+Upstream-Status: Backport from
+[https://github.com/linux-test-project/ltp/commit/e84f0689]
+
+Link: https://lore.kernel.org/ltp/39ee7abdee12e22074b40d46775d69d37725b932.1754386027.git.jstancek@redhat.com/
+Reviewed-by: Andrea Cervesato <andrea.cervesato@suse.com>
+Reviewed-by: Petr Vorel <pvorel@suse.cz>
+Reviewed-by: Avinesh Kumar <akumar@suse.de>
+Tested-by: Avinesh Kumar <akumar@suse.de>
+Signed-off-by: Jan Stancek <jstancek@redhat.com>
+[ modify TST_EXP_FAIL2_ARR function parameters ]
+Signed-off-by: Li Wang <li.wang@windriver.com>
+---
+ testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c | 7 +++++--
+ 1 file changed, 5 insertions(+), 2 deletions(-)
+
+diff --git a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c
+index 955959b6b26..feb49623b15 100644
+--- a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c
++++ b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c
+@@ -51,13 +51,16 @@ static void cleanup(void)
+
+ static void verify_epoll_ctl(void)
+ {
++ const int exp_errnos[] = {EINVAL, ELOOP};
++
+ new_epfd = epoll_create(1);
+ if (new_epfd == -1)
+ tst_brk(TBROK | TERRNO, "fail to create epoll instance");
+
+ events.data.fd = epfd;
+- TST_EXP_FAIL(epoll_ctl(new_epfd, EPOLL_CTL_ADD, epfd, &events), EINVAL,
+- "epoll_ctl(..., EPOLL_CTL_ADD, ...) with number of nesting is 5");
++ TST_EXP_FAIL2_ARR(epoll_ctl(new_epfd, EPOLL_CTL_ADD, epfd, &events),
++ exp_errnos,
++ "epoll_ctl(..., EPOLL_CTL_ADD, ...) with number of nesting is 5");
+ SAFE_CLOSE(new_epfd);
+ }
+
diff --git a/meta/recipes-extended/ltp/ltp_20240129.bb b/meta/recipes-extended/ltp/ltp_20240129.bb
index 18c64392839..ec31c985445 100644
--- a/meta/recipes-extended/ltp/ltp_20240129.bb
+++ b/meta/recipes-extended/ltp/ltp_20240129.bb
@@ -31,6 +31,7 @@ SRC_URI = "git://github.com/linux-test-project/ltp.git;branch=master;protocol=ht
file://0001-scenario_groups-default-remove-connectors.patch \
file://0001-sched_stress-Use-time_t-instead-of-long-for-type.patch \
file://0001-cve-2015-3290-Disable-AVX-for-x86_64.patch \
+ file://0001-syscalls-epoll_ctl04-add-ELOOP-to-expected-errnos.patch \
"
S = "${WORKDIR}/git"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 39/66] kernel-devsrc: make tools/Build optional
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (37 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 38/66] ltp: fix epoll_ctl04 failed Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 40/66] dbus: use ${PN} in pkg_postinst instead of 'dbus' Yoann Congal
` (26 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
kernel-devsrc fails to copy files for v6.12+ as the
following upstream commit has removed the file tools/build/Build:
commit ea974028a049f2cea4bb6be963ee3e3844a03f6d
Author: Brian Norris <briannorris@chromium.org>
Date: Mon Jul 15 13:32:43 2024 -0700
tools build: Avoid circular .fixdep-in.o.cmd issues
We make the failed copy of this file non-fatal to support
all kernel versions.
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 13e16e5be25f379211c7329fa1462464174c0f2d)
Suggested-by: Calvin Owens <calvin@wbinvd.org>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-kernel/linux/kernel-devsrc.bb | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/recipes-kernel/linux/kernel-devsrc.bb b/meta/recipes-kernel/linux/kernel-devsrc.bb
index 77249671513..1500aff2e25 100644
--- a/meta/recipes-kernel/linux/kernel-devsrc.bb
+++ b/meta/recipes-kernel/linux/kernel-devsrc.bb
@@ -156,7 +156,7 @@ do_install() {
# these are a few files associated with objtool, since we'll need to
# rebuild it
cp -a --parents tools/build/Build.include $kerneldir/build/
- cp -a --parents tools/build/Build $kerneldir/build/
+ cp -a --parents tools/build/Build $kerneldir/build/ 2>/dev/null || :
cp -a --parents tools/build/fixdep.c $kerneldir/build/
cp -a --parents tools/scripts/utilities.mak $kerneldir/build/
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 40/66] dbus: use ${PN} in pkg_postinst instead of 'dbus'
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (38 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 39/66] kernel-devsrc: make tools/Build optional Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 41/66] linux-yocto/6.6: update CVE exclusions (6.6.123) Yoann Congal
` (25 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Martin Jansa <martin.jansa@gmail.com>
All pkg_postinst in oe-core where the package name matches the recipe
name use ${PN} already.
We have a bbclass used by some recipes which does:
pkg_postinst:${PN}:append()
which works reasonably well for most of the recipes, except for dbus
where it causes:
WARNING: meta/recipes-core/dbus/dbus_1.16.2.bb:
Variable key pkg_postinst:${PN} (...)
replaces original key pkg_postinst:dbus (...)
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
(cherry picked from commit efec0447c8e8a6003f00642b33a71ed94fc4ec82)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-core/dbus/dbus_1.14.10.bb | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/recipes-core/dbus/dbus_1.14.10.bb b/meta/recipes-core/dbus/dbus_1.14.10.bb
index 4fe7af7512b..ffbf0780ed1 100644
--- a/meta/recipes-core/dbus/dbus_1.14.10.bb
+++ b/meta/recipes-core/dbus/dbus_1.14.10.bb
@@ -109,7 +109,7 @@ FILES:${PN}-dev += "${libdir}/dbus-1.0/include ${bindir}/dbus-test-tool ${datadi
RDEPENDS:${PN}-ptest += "bash make dbus"
PACKAGE_WRITE_DEPS += "${@bb.utils.contains('DISTRO_FEATURES','systemd sysvinit','systemd-systemctl-native','',d)}"
-pkg_postinst:dbus() {
+pkg_postinst:${PN}() {
# If both systemd and sysvinit are enabled, mask the dbus-1 init script
if ${@bb.utils.contains('DISTRO_FEATURES','systemd sysvinit','true','false',d)}; then
if [ -n "$D" ]; then
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 41/66] linux-yocto/6.6: update CVE exclusions (6.6.123)
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (39 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 40/66] dbus: use ${PN} in pkg_postinst instead of 'dbus' Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 21:12 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 42/66] build-appliance-image: switch SRC_URI to https protocol Yoann Congal
` (24 subsequent siblings)
65 siblings, 1 reply; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: João Marcos Costa (Schneider Electric) <joaomarcos.costa@bootlin.com>
This new version of cve-exclusion_6.6.inc was generated with oe-core's
latest version of the generate-cve-exclusions.py.
Regarding the database used and how this file was generated:
Generated at 2026-04-03 09:30:32.247568+00:00 for kernel version 6.6.123
From cvelistV5 cve_2026-04-03_0700Z
The backporting of the generate-cve-exclusions.py script from master to
Scarthgap is handled in a different patch.
Signed-off-by: João Marcos Costa (Schneider Electric) <joaomarcos.costa@bootlin.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../linux/cve-exclusion_6.6.inc | 21144 +++++++++++++---
1 file changed, 17901 insertions(+), 3243 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc
index 32a0701edfa..99f4ebcdd9f 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc
@@ -1,5728 +1,5820 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2024-06-06 20:41:33.044442+00:00 for version 6.6.32
+# Generated at 2026-04-03 09:30:32.247568+00:00 for kernel version 6.6.123
+# From cvelistV5 cve_2026-04-03_0700Z
-#python check_kernel_cve_status_version() {
-# this_version = "6.6.29"
-# kernel_version = d.getVar("LINUX_VERSION")
-# if kernel_version != this_version:
-# bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
-#}
-#do_cve_check[prefuncs] += "check_kernel_cve_status_version"
-CVE_STATUS[CVE-2003-1604] = "fixed-version: Fixed from version 2.6.12rc2"
+python check_kernel_cve_status_version() {
+ this_version = "6.6.123"
+ kernel_version = d.getVar("LINUX_VERSION")
+ if kernel_version != this_version:
+ bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
+}
+do_cve_check[prefuncs] += "check_kernel_cve_status_version"
-CVE_STATUS[CVE-2004-0230] = "fixed-version: Fixed from version 3.6rc1"
+CVE_STATUS[CVE-2019-25160] = "fixed-version: Fixed from version 5.0"
-# CVE-2005-3660 has no known resolution
+CVE_STATUS[CVE-2019-25162] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2006-3635] = "fixed-version: Fixed from version 2.6.26rc5"
+# CVE-2019-3459 has no known resolution
-CVE_STATUS[CVE-2006-5331] = "fixed-version: Fixed from version 2.6.19rc3"
+# CVE-2019-3460 has no known resolution
-CVE_STATUS[CVE-2006-6128] = "fixed-version: Fixed from version 2.6.19rc2"
+CVE_STATUS[CVE-2020-36775] = "fixed-version: Fixed from version 5.7"
-# CVE-2007-3719 has no known resolution
+CVE_STATUS[CVE-2020-36776] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2007-4774] = "fixed-version: Fixed from version 2.6.12rc2"
+CVE_STATUS[CVE-2020-36777] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2007-6761] = "fixed-version: Fixed from version 2.6.24rc6"
+CVE_STATUS[CVE-2020-36778] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2007-6762] = "fixed-version: Fixed from version 2.6.20rc5"
+CVE_STATUS[CVE-2020-36779] = "fixed-version: Fixed from version 5.13"
-# CVE-2008-2544 has no known resolution
+CVE_STATUS[CVE-2020-36780] = "fixed-version: Fixed from version 5.13"
-# CVE-2008-4609 has no known resolution
+CVE_STATUS[CVE-2020-36781] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2008-7316] = "fixed-version: Fixed from version 2.6.25rc1"
+CVE_STATUS[CVE-2020-36782] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2009-2692] = "fixed-version: Fixed from version 2.6.31rc6"
+CVE_STATUS[CVE-2020-36783] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2010-0008] = "fixed-version: Fixed from version 2.6.23rc9"
+CVE_STATUS[CVE-2020-36784] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2010-3432] = "fixed-version: Fixed from version 2.6.36rc5"
+CVE_STATUS[CVE-2020-36785] = "fixed-version: Fixed from version 5.13"
-# CVE-2010-4563 has no known resolution
+CVE_STATUS[CVE-2020-36786] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2010-4648] = "fixed-version: Fixed from version 2.6.37rc6"
+CVE_STATUS[CVE-2020-36787] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2010-5313] = "fixed-version: Fixed from version 2.6.38rc1"
+CVE_STATUS[CVE-2020-36788] = "fixed-version: Fixed from version 5.15"
-# CVE-2010-5321 has no known resolution
+CVE_STATUS[CVE-2020-36789] = "fixed-version: Fixed from version 5.10"
-CVE_STATUS[CVE-2010-5328] = "fixed-version: Fixed from version 2.6.35rc1"
+CVE_STATUS[CVE-2020-36790] = "fixed-version: Fixed from version 5.9"
-CVE_STATUS[CVE-2010-5329] = "fixed-version: Fixed from version 2.6.39rc1"
+CVE_STATUS[CVE-2020-36791] = "fixed-version: Fixed from version 5.5.14"
-CVE_STATUS[CVE-2010-5331] = "fixed-version: Fixed from version 2.6.34rc7"
+# CVE-2021-28688 has no known resolution
-CVE_STATUS[CVE-2010-5332] = "fixed-version: Fixed from version 2.6.37rc1"
+# CVE-2021-28691 has no known resolution
-CVE_STATUS[CVE-2011-4098] = "fixed-version: Fixed from version 3.2rc1"
+# CVE-2021-28711 has no known resolution
-CVE_STATUS[CVE-2011-4131] = "fixed-version: Fixed from version 3.3rc1"
+# CVE-2021-28712 has no known resolution
-CVE_STATUS[CVE-2011-4915] = "fixed-version: Fixed from version 3.2rc1"
+# CVE-2021-28713 has no known resolution
-# CVE-2011-4916 has no known resolution
+# CVE-2021-28714 has no known resolution
-# CVE-2011-4917 has no known resolution
+# CVE-2021-28715 has no known resolution
-CVE_STATUS[CVE-2011-5321] = "fixed-version: Fixed from version 3.2rc1"
+CVE_STATUS[CVE-2021-46904] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2011-5327] = "fixed-version: Fixed from version 3.1rc1"
+CVE_STATUS[CVE-2021-46905] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-0957] = "fixed-version: Fixed from version 3.7rc2"
+CVE_STATUS[CVE-2021-46906] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-2119] = "fixed-version: Fixed from version 3.5rc1"
+CVE_STATUS[CVE-2021-46908] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-2136] = "fixed-version: Fixed from version 3.5rc1"
+CVE_STATUS[CVE-2021-46909] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-2137] = "fixed-version: Fixed from version 3.5rc2"
+CVE_STATUS[CVE-2021-46910] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-2313] = "fixed-version: Fixed from version 3.4rc6"
+CVE_STATUS[CVE-2021-46911] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-2319] = "fixed-version: Fixed from version 3.4rc6"
+CVE_STATUS[CVE-2021-46912] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-2372] = "fixed-version: Fixed from version 3.13rc4"
+CVE_STATUS[CVE-2021-46913] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-2375] = "fixed-version: Fixed from version 3.4rc1"
+CVE_STATUS[CVE-2021-46914] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-2390] = "fixed-version: Fixed from version 3.5rc1"
+CVE_STATUS[CVE-2021-46915] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-2669] = "fixed-version: Fixed from version 3.5rc4"
+CVE_STATUS[CVE-2021-46916] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-2744] = "fixed-version: Fixed from version 2.6.34rc1"
+CVE_STATUS[CVE-2021-46917] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-2745] = "fixed-version: Fixed from version 3.4rc3"
+CVE_STATUS[CVE-2021-46918] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-3364] = "fixed-version: Fixed from version 3.5rc6"
+CVE_STATUS[CVE-2021-46919] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-3375] = "fixed-version: Fixed from version 3.4rc5"
+CVE_STATUS[CVE-2021-46920] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-3400] = "fixed-version: Fixed from version 3.5rc5"
+CVE_STATUS[CVE-2021-46921] = "fixed-version: Fixed from version 5.12"
-CVE_STATUS[CVE-2012-3412] = "fixed-version: Fixed from version 3.6rc2"
+CVE_STATUS[CVE-2021-46922] = "fixed-version: Fixed from version 5.11.17"
-CVE_STATUS[CVE-2012-3430] = "fixed-version: Fixed from version 3.6rc1"
+CVE_STATUS[CVE-2021-46923] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2012-3510] = "fixed-version: Fixed from version 2.6.19rc4"
+CVE_STATUS[CVE-2021-46924] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2012-3511] = "fixed-version: Fixed from version 3.5rc6"
+CVE_STATUS[CVE-2021-46925] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2012-3520] = "fixed-version: Fixed from version 3.6rc3"
+CVE_STATUS[CVE-2021-46926] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2012-3552] = "fixed-version: Fixed from version 3.0rc1"
+CVE_STATUS[CVE-2021-46927] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2012-4220, no affected_versions
+CVE_STATUS[CVE-2021-46928] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2012-4221, no affected_versions
+CVE_STATUS[CVE-2021-46929] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2012-4222, no affected_versions
+CVE_STATUS[CVE-2021-46930] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2012-4398] = "fixed-version: Fixed from version 3.4rc1"
+CVE_STATUS[CVE-2021-46931] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2012-4444] = "fixed-version: Fixed from version 2.6.36rc4"
+CVE_STATUS[CVE-2021-46932] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2012-4461] = "fixed-version: Fixed from version 3.7rc6"
+CVE_STATUS[CVE-2021-46933] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2012-4467] = "fixed-version: Fixed from version 3.6rc5"
+CVE_STATUS[CVE-2021-46934] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2012-4508] = "fixed-version: Fixed from version 3.7rc3"
+CVE_STATUS[CVE-2021-46935] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2012-4530] = "fixed-version: Fixed from version 3.8rc1"
+CVE_STATUS[CVE-2021-46936] = "fixed-version: Fixed from version 5.16"
-# CVE-2012-4542 has no known resolution
+CVE_STATUS[CVE-2021-46937] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2012-4565] = "fixed-version: Fixed from version 3.7rc4"
+CVE_STATUS[CVE-2021-46938] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-5374] = "fixed-version: Fixed from version 3.8rc1"
+CVE_STATUS[CVE-2021-46939] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-5375] = "fixed-version: Fixed from version 3.8rc1"
+CVE_STATUS[CVE-2021-46940] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-5517] = "fixed-version: Fixed from version 3.6rc1"
+CVE_STATUS[CVE-2021-46941] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6536] = "fixed-version: Fixed from version 3.6rc7"
+CVE_STATUS[CVE-2021-46942] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6537] = "fixed-version: Fixed from version 3.6rc7"
+CVE_STATUS[CVE-2021-46943] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6538] = "fixed-version: Fixed from version 3.6rc7"
+CVE_STATUS[CVE-2021-46944] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6539] = "fixed-version: Fixed from version 3.6rc3"
+CVE_STATUS[CVE-2021-46945] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6540] = "fixed-version: Fixed from version 3.6rc3"
+CVE_STATUS[CVE-2021-46947] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6541] = "fixed-version: Fixed from version 3.6rc3"
+CVE_STATUS[CVE-2021-46948] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6542] = "fixed-version: Fixed from version 3.6rc3"
+CVE_STATUS[CVE-2021-46949] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6543] = "fixed-version: Fixed from version 3.6rc3"
+CVE_STATUS[CVE-2021-46950] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6544] = "fixed-version: Fixed from version 3.6rc3"
+CVE_STATUS[CVE-2021-46951] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6545] = "fixed-version: Fixed from version 3.6rc3"
+CVE_STATUS[CVE-2021-46952] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6546] = "fixed-version: Fixed from version 3.6rc3"
+CVE_STATUS[CVE-2021-46953] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6547] = "fixed-version: Fixed from version 3.6rc1"
+CVE_STATUS[CVE-2021-46954] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6548] = "fixed-version: Fixed from version 3.6rc1"
+CVE_STATUS[CVE-2021-46955] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6549] = "fixed-version: Fixed from version 3.6rc1"
+CVE_STATUS[CVE-2021-46956] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6638] = "fixed-version: Fixed from version 3.3rc1"
+CVE_STATUS[CVE-2021-46957] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6647] = "fixed-version: Fixed from version 3.6rc2"
+CVE_STATUS[CVE-2021-46958] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6657] = "fixed-version: Fixed from version 3.6"
+CVE_STATUS[CVE-2021-46959] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6689] = "fixed-version: Fixed from version 3.6rc5"
+CVE_STATUS[CVE-2021-46960] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6701] = "fixed-version: Fixed from version 3.5rc1"
+CVE_STATUS[CVE-2021-46961] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6703] = "fixed-version: Fixed from version 3.7rc1"
+CVE_STATUS[CVE-2021-46962] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6704] = "fixed-version: Fixed from version 3.5rc1"
+CVE_STATUS[CVE-2021-46963] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2012-6712] = "fixed-version: Fixed from version 3.4rc1"
+CVE_STATUS[CVE-2021-46964] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0160] = "fixed-version: Fixed from version 3.9rc1"
+CVE_STATUS[CVE-2021-46965] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0190] = "fixed-version: Fixed from version 3.8rc5"
+CVE_STATUS[CVE-2021-46966] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0216] = "fixed-version: Fixed from version 3.8rc7"
+CVE_STATUS[CVE-2021-46967] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0217] = "fixed-version: Fixed from version 3.8rc7"
+CVE_STATUS[CVE-2021-46968] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0228] = "fixed-version: Fixed from version 3.8"
+CVE_STATUS[CVE-2021-46969] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0231] = "fixed-version: Fixed from version 3.8rc7"
+CVE_STATUS[CVE-2021-46970] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0268] = "fixed-version: Fixed from version 3.8rc6"
+CVE_STATUS[CVE-2021-46971] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0290] = "fixed-version: Fixed from version 3.8"
+CVE_STATUS[CVE-2021-46972] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0309] = "fixed-version: Fixed from version 3.7rc1"
+CVE_STATUS[CVE-2021-46973] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0310] = "fixed-version: Fixed from version 3.5"
+CVE_STATUS[CVE-2021-46974] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0311] = "fixed-version: Fixed from version 3.7rc8"
+CVE_STATUS[CVE-2021-46976] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0313] = "fixed-version: Fixed from version 3.8rc5"
+CVE_STATUS[CVE-2021-46977] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0343] = "fixed-version: Fixed from version 3.11rc7"
+CVE_STATUS[CVE-2021-46978] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0349] = "fixed-version: Fixed from version 3.8rc6"
+CVE_STATUS[CVE-2021-46979] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0871] = "fixed-version: Fixed from version 3.8rc5"
+CVE_STATUS[CVE-2021-46980] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0913] = "fixed-version: Fixed from version 3.9rc4"
+CVE_STATUS[CVE-2021-46981] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-0914] = "fixed-version: Fixed from version 3.9rc3"
+CVE_STATUS[CVE-2021-46982] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1059] = "fixed-version: Fixed from version 3.11rc1"
+CVE_STATUS[CVE-2021-46983] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1763] = "fixed-version: Fixed from version 3.9rc1"
+CVE_STATUS[CVE-2021-46984] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1767] = "fixed-version: Fixed from version 3.9rc1"
+CVE_STATUS[CVE-2021-46985] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1772] = "fixed-version: Fixed from version 3.5rc1"
+CVE_STATUS[CVE-2021-46986] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1773] = "fixed-version: Fixed from version 3.3rc1"
+CVE_STATUS[CVE-2021-46987] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1774] = "fixed-version: Fixed from version 3.8rc5"
+CVE_STATUS[CVE-2021-46988] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1792] = "fixed-version: Fixed from version 3.9rc3"
+CVE_STATUS[CVE-2021-46989] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1796] = "fixed-version: Fixed from version 3.9rc4"
+CVE_STATUS[CVE-2021-46990] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1797] = "fixed-version: Fixed from version 3.9rc4"
+CVE_STATUS[CVE-2021-46991] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1798] = "fixed-version: Fixed from version 3.9rc4"
+CVE_STATUS[CVE-2021-46992] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1819] = "fixed-version: Fixed from version 3.8rc6"
+CVE_STATUS[CVE-2021-46993] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1826] = "fixed-version: Fixed from version 3.6rc7"
+CVE_STATUS[CVE-2021-46994] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1827] = "fixed-version: Fixed from version 3.6rc3"
+CVE_STATUS[CVE-2021-46995] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1828] = "fixed-version: Fixed from version 3.9rc2"
+CVE_STATUS[CVE-2021-46996] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1848] = "fixed-version: Fixed from version 3.9rc3"
+CVE_STATUS[CVE-2021-46997] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1858] = "fixed-version: Fixed from version 3.9rc3"
+CVE_STATUS[CVE-2021-46998] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1860] = "fixed-version: Fixed from version 3.9rc3"
+CVE_STATUS[CVE-2021-46999] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1928] = "fixed-version: Fixed from version 3.7rc3"
+CVE_STATUS[CVE-2021-47000] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1929] = "fixed-version: Fixed from version 3.9rc6"
+CVE_STATUS[CVE-2021-47001] = "fixed-version: Fixed from version 5.13"
-# Skipping CVE-2013-1935, no affected_versions
+CVE_STATUS[CVE-2021-47002] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1943] = "fixed-version: Fixed from version 3.0rc1"
+CVE_STATUS[CVE-2021-47003] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1956] = "fixed-version: Fixed from version 3.9rc5"
+CVE_STATUS[CVE-2021-47004] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1957] = "fixed-version: Fixed from version 3.9rc5"
+CVE_STATUS[CVE-2021-47005] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1958] = "fixed-version: Fixed from version 3.9rc5"
+CVE_STATUS[CVE-2021-47006] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1959] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47007] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-1979] = "fixed-version: Fixed from version 3.9rc8"
+CVE_STATUS[CVE-2021-47008] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2015] = "fixed-version: Fixed from version 3.8rc2"
+CVE_STATUS[CVE-2021-47009] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2017] = "fixed-version: Fixed from version 2.6.34"
+CVE_STATUS[CVE-2021-47010] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2058] = "fixed-version: Fixed from version 3.8rc4"
+CVE_STATUS[CVE-2021-47011] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2094] = "fixed-version: Fixed from version 3.9rc8"
+CVE_STATUS[CVE-2021-47012] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2128] = "fixed-version: Fixed from version 2.6.34rc4"
+CVE_STATUS[CVE-2021-47013] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2140] = "fixed-version: Fixed from version 3.11rc3"
+CVE_STATUS[CVE-2021-47014] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2141] = "fixed-version: Fixed from version 3.9rc8"
+CVE_STATUS[CVE-2021-47015] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2146] = "fixed-version: Fixed from version 3.9rc8"
+CVE_STATUS[CVE-2021-47016] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2147] = "fixed-version: Fixed from version 3.12rc3"
+CVE_STATUS[CVE-2021-47017] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2148] = "fixed-version: Fixed from version 3.11rc1"
+CVE_STATUS[CVE-2021-47018] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2164] = "fixed-version: Fixed from version 3.11rc1"
+CVE_STATUS[CVE-2021-47019] = "fixed-version: Fixed from version 5.13"
-# Skipping CVE-2013-2188, no affected_versions
+CVE_STATUS[CVE-2021-47020] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2206] = "fixed-version: Fixed from version 3.9rc4"
+CVE_STATUS[CVE-2021-47021] = "fixed-version: Fixed from version 5.13"
-# Skipping CVE-2013-2224, no affected_versions
+CVE_STATUS[CVE-2021-47022] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2232] = "fixed-version: Fixed from version 3.10"
+CVE_STATUS[CVE-2021-47023] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2234] = "fixed-version: Fixed from version 3.10"
+CVE_STATUS[CVE-2021-47024] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2237] = "fixed-version: Fixed from version 3.9rc6"
+CVE_STATUS[CVE-2021-47025] = "fixed-version: Fixed from version 5.13"
-# Skipping CVE-2013-2239, no affected_versions
+CVE_STATUS[CVE-2021-47026] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2546] = "fixed-version: Fixed from version 3.9rc1"
+CVE_STATUS[CVE-2021-47027] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2547] = "fixed-version: Fixed from version 3.9rc1"
+CVE_STATUS[CVE-2021-47028] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2548] = "fixed-version: Fixed from version 3.9rc1"
+CVE_STATUS[CVE-2021-47029] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2596] = "fixed-version: Fixed from version 3.9rc8"
+CVE_STATUS[CVE-2021-47030] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2634] = "fixed-version: Fixed from version 3.9rc3"
+CVE_STATUS[CVE-2021-47031] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2635] = "fixed-version: Fixed from version 3.9rc3"
+CVE_STATUS[CVE-2021-47032] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2636] = "fixed-version: Fixed from version 3.9rc3"
+CVE_STATUS[CVE-2021-47033] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2850] = "fixed-version: Fixed from version 3.10rc4"
+CVE_STATUS[CVE-2021-47034] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2851] = "fixed-version: Fixed from version 3.11rc1"
+CVE_STATUS[CVE-2021-47035] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2852] = "fixed-version: Fixed from version 3.10rc6"
+CVE_STATUS[CVE-2021-47036] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2888] = "fixed-version: Fixed from version 3.12rc1"
+CVE_STATUS[CVE-2021-47037] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2889] = "fixed-version: Fixed from version 3.12rc2"
+CVE_STATUS[CVE-2021-47038] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2890] = "fixed-version: Fixed from version 3.12rc2"
+CVE_STATUS[CVE-2021-47039] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2891] = "fixed-version: Fixed from version 3.12rc2"
+CVE_STATUS[CVE-2021-47040] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2892] = "fixed-version: Fixed from version 3.12rc1"
+CVE_STATUS[CVE-2021-47041] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2893] = "fixed-version: Fixed from version 3.12rc2"
+CVE_STATUS[CVE-2021-47042] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2894] = "fixed-version: Fixed from version 3.12rc2"
+CVE_STATUS[CVE-2021-47043] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2895] = "fixed-version: Fixed from version 3.12rc2"
+CVE_STATUS[CVE-2021-47044] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2896] = "fixed-version: Fixed from version 3.12rc1"
+CVE_STATUS[CVE-2021-47045] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2897] = "fixed-version: Fixed from version 3.12rc2"
+CVE_STATUS[CVE-2021-47046] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2898] = "fixed-version: Fixed from version 3.12rc1"
+CVE_STATUS[CVE-2021-47047] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2899] = "fixed-version: Fixed from version 3.12rc1"
+CVE_STATUS[CVE-2021-47048] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2929] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47049] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-2930] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47050] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3076] = "fixed-version: Fixed from version 3.9"
+CVE_STATUS[CVE-2021-47051] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3222] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47052] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3223] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47053] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3224] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47054] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3225] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47055] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3226] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47056] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3227] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47057] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3228] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47058] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3229] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47059] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3230] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47060] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3231] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47061] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3232] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47062] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3233] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47063] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3234] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47064] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3235] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47065] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3236] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47066] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3237] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47067] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3301] = "fixed-version: Fixed from version 3.9rc7"
+CVE_STATUS[CVE-2021-47068] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-3302] = "fixed-version: Fixed from version 3.8rc3"
+CVE_STATUS[CVE-2021-47069] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-4125] = "fixed-version: Fixed from version 3.11rc1"
+CVE_STATUS[CVE-2021-47070] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-4127] = "fixed-version: Fixed from version 3.11rc1"
+CVE_STATUS[CVE-2021-47071] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-4129] = "fixed-version: Fixed from version 3.11rc1"
+CVE_STATUS[CVE-2021-47072] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-4162] = "fixed-version: Fixed from version 3.11rc1"
+CVE_STATUS[CVE-2021-47073] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-4163] = "fixed-version: Fixed from version 3.11rc1"
+CVE_STATUS[CVE-2021-47074] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-4205] = "fixed-version: Fixed from version 3.11rc5"
+CVE_STATUS[CVE-2021-47075] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-4220] = "fixed-version: Fixed from version 3.10rc4"
+CVE_STATUS[CVE-2021-47076] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-4247] = "fixed-version: Fixed from version 3.10rc5"
+CVE_STATUS[CVE-2021-47077] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-4254] = "fixed-version: Fixed from version 3.11rc6"
+CVE_STATUS[CVE-2021-47078] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-4270] = "fixed-version: Fixed from version 3.12rc4"
+CVE_STATUS[CVE-2021-47079] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-4299] = "fixed-version: Fixed from version 3.12rc6"
+CVE_STATUS[CVE-2021-47080] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-4300] = "fixed-version: Fixed from version 3.11"
+CVE_STATUS[CVE-2021-47081] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-4312] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47082] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4343] = "fixed-version: Fixed from version 3.12rc2"
+CVE_STATUS[CVE-2021-47083] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4345] = "fixed-version: Fixed from version 3.13rc2"
+CVE_STATUS[CVE-2021-47086] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4348] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47087] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4350] = "fixed-version: Fixed from version 3.12rc2"
+CVE_STATUS[CVE-2021-47088] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4387] = "fixed-version: Fixed from version 3.12rc4"
+CVE_STATUS[CVE-2021-47089] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4470] = "fixed-version: Fixed from version 3.12rc7"
+CVE_STATUS[CVE-2021-47090] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4483] = "fixed-version: Fixed from version 3.10rc1"
+CVE_STATUS[CVE-2021-47091] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4511] = "fixed-version: Fixed from version 3.12"
+CVE_STATUS[CVE-2021-47092] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4512] = "fixed-version: Fixed from version 3.12"
+CVE_STATUS[CVE-2021-47093] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4513] = "fixed-version: Fixed from version 3.12"
+CVE_STATUS[CVE-2021-47094] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4514] = "fixed-version: Fixed from version 3.12"
+CVE_STATUS[CVE-2021-47095] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4515] = "fixed-version: Fixed from version 3.12"
+CVE_STATUS[CVE-2021-47096] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4516] = "fixed-version: Fixed from version 3.12"
+CVE_STATUS[CVE-2021-47097] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4563] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47098] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4579] = "fixed-version: Fixed from version 3.13rc7"
+CVE_STATUS[CVE-2021-47099] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4587] = "fixed-version: Fixed from version 3.13rc4"
+CVE_STATUS[CVE-2021-47100] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4588] = "fixed-version: Fixed from version 2.6.33rc4"
+CVE_STATUS[CVE-2021-47101] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4591] = "fixed-version: Fixed from version 3.8rc1"
+CVE_STATUS[CVE-2021-47102] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-4592] = "fixed-version: Fixed from version 3.7rc1"
+CVE_STATUS[CVE-2021-47103] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2013-4737, no affected_versions
+CVE_STATUS[CVE-2021-47104] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2013-4738, no affected_versions
+CVE_STATUS[CVE-2021-47105] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2013-4739, no affected_versions
+CVE_STATUS[CVE-2021-47106] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-5634] = "fixed-version: Fixed from version 3.10rc5"
+CVE_STATUS[CVE-2021-47107] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-6282] = "fixed-version: Fixed from version 3.6rc6"
+CVE_STATUS[CVE-2021-47108] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2013-6367] = "fixed-version: Fixed from version 3.13rc4"
+CVE_STATUS[CVE-2021-47109] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-6368] = "fixed-version: Fixed from version 3.13rc4"
+CVE_STATUS[CVE-2021-47110] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-6376] = "fixed-version: Fixed from version 3.13rc4"
+CVE_STATUS[CVE-2021-47111] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-6378] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47112] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-6380] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47113] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-6381] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47114] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-6382] = "fixed-version: Fixed from version 3.13rc4"
+CVE_STATUS[CVE-2021-47116] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-6383] = "fixed-version: Fixed from version 3.12"
+CVE_STATUS[CVE-2021-47117] = "fixed-version: Fixed from version 5.13"
-# Skipping CVE-2013-6392, no affected_versions
+CVE_STATUS[CVE-2021-47118] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-6431] = "fixed-version: Fixed from version 3.12rc1"
+CVE_STATUS[CVE-2021-47119] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-6432] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47120] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-6885] = "fixed-version: Fixed from version 3.14rc1"
+CVE_STATUS[CVE-2021-47121] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7026] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47122] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7027] = "fixed-version: Fixed from version 3.12rc7"
+CVE_STATUS[CVE-2021-47123] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7263] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47124] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7264] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47125] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7265] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47126] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7266] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47127] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7267] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47128] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7268] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47129] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7269] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47130] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7270] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47131] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7271] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47132] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7281] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47133] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7339] = "fixed-version: Fixed from version 3.13rc7"
+CVE_STATUS[CVE-2021-47134] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7348] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47135] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7421] = "fixed-version: Fixed from version 3.19rc1"
+CVE_STATUS[CVE-2021-47136] = "fixed-version: Fixed from version 5.13"
-# CVE-2013-7445 has no known resolution
+CVE_STATUS[CVE-2021-47137] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7446] = "fixed-version: Fixed from version 4.4rc4"
+CVE_STATUS[CVE-2021-47138] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2013-7470] = "fixed-version: Fixed from version 3.12rc7"
+CVE_STATUS[CVE-2021-47139] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0038] = "fixed-version: Fixed from version 3.14rc1"
+CVE_STATUS[CVE-2021-47140] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0049] = "fixed-version: Fixed from version 3.14rc5"
+CVE_STATUS[CVE-2021-47141] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0055] = "fixed-version: Fixed from version 3.14"
+CVE_STATUS[CVE-2021-47142] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0069] = "fixed-version: Fixed from version 3.14rc4"
+CVE_STATUS[CVE-2021-47143] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0077] = "fixed-version: Fixed from version 3.14"
+CVE_STATUS[CVE-2021-47145] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0100] = "fixed-version: Fixed from version 3.14rc7"
+CVE_STATUS[CVE-2021-47146] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0101] = "fixed-version: Fixed from version 3.14rc6"
+CVE_STATUS[CVE-2021-47147] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0102] = "fixed-version: Fixed from version 3.14rc6"
+CVE_STATUS[CVE-2021-47148] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0131] = "fixed-version: Fixed from version 3.14rc7"
+CVE_STATUS[CVE-2021-47149] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0155] = "fixed-version: Fixed from version 3.15rc2"
+CVE_STATUS[CVE-2021-47150] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0181] = "fixed-version: Fixed from version 3.15rc5"
+CVE_STATUS[CVE-2021-47151] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0196] = "fixed-version: Fixed from version 3.15rc5"
+CVE_STATUS[CVE-2021-47152] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0203] = "fixed-version: Fixed from version 2.6.33rc5"
+CVE_STATUS[CVE-2021-47153] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0205] = "fixed-version: Fixed from version 2.6.37rc1"
+CVE_STATUS[CVE-2021-47158] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-0206] = "fixed-version: Fixed from version 3.16rc3"
+CVE_STATUS[CVE-2021-47159] = "fixed-version: Fixed from version 5.13"
-# Skipping CVE-2014-0972, no affected_versions
+CVE_STATUS[CVE-2021-47160] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-1438] = "fixed-version: Fixed from version 3.13"
+CVE_STATUS[CVE-2021-47161] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-1444] = "fixed-version: Fixed from version 3.12rc7"
+CVE_STATUS[CVE-2021-47162] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-1445] = "fixed-version: Fixed from version 3.12rc7"
+CVE_STATUS[CVE-2021-47163] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-1446] = "fixed-version: Fixed from version 3.13rc7"
+CVE_STATUS[CVE-2021-47164] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-1690] = "fixed-version: Fixed from version 3.13rc8"
+CVE_STATUS[CVE-2021-47165] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-1737] = "fixed-version: Fixed from version 3.15rc5"
+CVE_STATUS[CVE-2021-47166] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-1738] = "fixed-version: Fixed from version 3.15rc5"
+CVE_STATUS[CVE-2021-47167] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-1739] = "fixed-version: Fixed from version 3.15rc6"
+CVE_STATUS[CVE-2021-47168] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-1874] = "fixed-version: Fixed from version 3.14rc2"
+CVE_STATUS[CVE-2021-47169] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-2038] = "fixed-version: Fixed from version 3.14rc1"
+CVE_STATUS[CVE-2021-47170] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-2039] = "fixed-version: Fixed from version 3.14rc3"
+CVE_STATUS[CVE-2021-47171] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-2309] = "fixed-version: Fixed from version 3.14rc7"
+CVE_STATUS[CVE-2021-47172] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-2523] = "fixed-version: Fixed from version 3.14rc1"
+CVE_STATUS[CVE-2021-47173] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-2568] = "fixed-version: Fixed from version 3.14"
+CVE_STATUS[CVE-2021-47174] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-2580] = "fixed-version: Fixed from version 3.15rc1"
+CVE_STATUS[CVE-2021-47175] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-2672] = "fixed-version: Fixed from version 3.14rc6"
+CVE_STATUS[CVE-2021-47176] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-2673] = "fixed-version: Fixed from version 3.14rc6"
+CVE_STATUS[CVE-2021-47177] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-2678] = "fixed-version: Fixed from version 3.15rc1"
+CVE_STATUS[CVE-2021-47178] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-2706] = "fixed-version: Fixed from version 3.14rc6"
+CVE_STATUS[CVE-2021-47179] = "fixed-version: Fixed from version 5.12.9"
-CVE_STATUS[CVE-2014-2739] = "fixed-version: Fixed from version 3.15rc1"
+CVE_STATUS[CVE-2021-47180] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-2851] = "fixed-version: Fixed from version 3.15rc2"
+CVE_STATUS[CVE-2021-47181] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-2889] = "fixed-version: Fixed from version 3.2rc7"
+CVE_STATUS[CVE-2021-47182] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3122] = "fixed-version: Fixed from version 3.15rc1"
+CVE_STATUS[CVE-2021-47183] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3144] = "fixed-version: Fixed from version 3.15rc2"
+CVE_STATUS[CVE-2021-47184] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3145] = "fixed-version: Fixed from version 3.15rc2"
+CVE_STATUS[CVE-2021-47185] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3153] = "fixed-version: Fixed from version 3.15"
+CVE_STATUS[CVE-2021-47186] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3180] = "fixed-version: Fixed from version 3.17rc4"
+CVE_STATUS[CVE-2021-47187] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3181] = "fixed-version: Fixed from version 3.17rc3"
+CVE_STATUS[CVE-2021-47188] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3182] = "fixed-version: Fixed from version 3.17rc2"
+CVE_STATUS[CVE-2021-47189] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3183] = "fixed-version: Fixed from version 3.17rc2"
+CVE_STATUS[CVE-2021-47190] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3184] = "fixed-version: Fixed from version 3.17rc2"
+CVE_STATUS[CVE-2021-47191] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3185] = "fixed-version: Fixed from version 3.17rc3"
+CVE_STATUS[CVE-2021-47192] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3186] = "fixed-version: Fixed from version 3.17rc3"
+CVE_STATUS[CVE-2021-47193] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2014-3519, no affected_versions
+CVE_STATUS[CVE-2021-47194] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3534] = "fixed-version: Fixed from version 3.16rc7"
+CVE_STATUS[CVE-2021-47195] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3535] = "fixed-version: Fixed from version 2.6.36rc1"
+CVE_STATUS[CVE-2021-47196] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3601] = "fixed-version: Fixed from version 3.17rc2"
+CVE_STATUS[CVE-2021-47197] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3610] = "fixed-version: Fixed from version 3.18rc2"
+CVE_STATUS[CVE-2021-47198] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3611] = "fixed-version: Fixed from version 3.18rc2"
+CVE_STATUS[CVE-2021-47199] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3631] = "fixed-version: Fixed from version 3.17rc5"
+CVE_STATUS[CVE-2021-47200] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3645] = "fixed-version: Fixed from version 3.12rc1"
+CVE_STATUS[CVE-2021-47201] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3646] = "fixed-version: Fixed from version 3.18rc2"
+CVE_STATUS[CVE-2021-47202] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3647] = "fixed-version: Fixed from version 3.18rc2"
+CVE_STATUS[CVE-2021-47203] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3673] = "fixed-version: Fixed from version 3.18rc1"
+CVE_STATUS[CVE-2021-47204] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3687] = "fixed-version: Fixed from version 3.18rc1"
+CVE_STATUS[CVE-2021-47205] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3688] = "fixed-version: Fixed from version 3.18rc1"
+CVE_STATUS[CVE-2021-47206] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3690] = "fixed-version: Fixed from version 3.18rc1"
+CVE_STATUS[CVE-2021-47207] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3917] = "fixed-version: Fixed from version 3.16rc1"
+CVE_STATUS[CVE-2021-47209] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-3940] = "fixed-version: Fixed from version 3.15"
+CVE_STATUS[CVE-2021-47210] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-4014] = "fixed-version: Fixed from version 3.16rc1"
+CVE_STATUS[CVE-2021-47211] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-4027] = "fixed-version: Fixed from version 3.14rc1"
+CVE_STATUS[CVE-2021-47212] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-4157] = "fixed-version: Fixed from version 3.15rc1"
+CVE_STATUS[CVE-2021-47214] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-4171] = "fixed-version: Fixed from version 3.16rc3"
+CVE_STATUS[CVE-2021-47215] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2014-4322, no affected_versions
+CVE_STATUS[CVE-2021-47216] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2014-4323, no affected_versions
+CVE_STATUS[CVE-2021-47217] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-4508] = "fixed-version: Fixed from version 3.16rc3"
+CVE_STATUS[CVE-2021-47218] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-4608] = "fixed-version: Fixed from version 3.18rc1"
+CVE_STATUS[CVE-2021-47219] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2014-4611] = "fixed-version: Fixed from version 3.16rc3"
+CVE_STATUS[CVE-2021-47221] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-4652] = "fixed-version: Fixed from version 3.16rc2"
+CVE_STATUS[CVE-2021-47222] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-4653] = "fixed-version: Fixed from version 3.16rc2"
+CVE_STATUS[CVE-2021-47223] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-4654] = "fixed-version: Fixed from version 3.16rc2"
+CVE_STATUS[CVE-2021-47224] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-4655] = "fixed-version: Fixed from version 3.16rc2"
+CVE_STATUS[CVE-2021-47225] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-4656] = "fixed-version: Fixed from version 3.16rc2"
+CVE_STATUS[CVE-2021-47226] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-4667] = "fixed-version: Fixed from version 3.16rc1"
+CVE_STATUS[CVE-2021-47227] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-4699] = "fixed-version: Fixed from version 3.16rc4"
+CVE_STATUS[CVE-2021-47228] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-4943] = "fixed-version: Fixed from version 3.16rc6"
+CVE_STATUS[CVE-2021-47229] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-5045] = "fixed-version: Fixed from version 3.16rc7"
+CVE_STATUS[CVE-2021-47230] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-5077] = "fixed-version: Fixed from version 3.16"
+CVE_STATUS[CVE-2021-47231] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-5206] = "fixed-version: Fixed from version 3.17rc1"
+CVE_STATUS[CVE-2021-47232] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-5207] = "fixed-version: Fixed from version 3.17rc1"
+CVE_STATUS[CVE-2021-47233] = "fixed-version: Fixed from version 5.13"
-# Skipping CVE-2014-5332, no affected_versions
+CVE_STATUS[CVE-2021-47234] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-5471] = "fixed-version: Fixed from version 3.17rc2"
+CVE_STATUS[CVE-2021-47235] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-5472] = "fixed-version: Fixed from version 3.17rc2"
+CVE_STATUS[CVE-2021-47236] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-6410] = "fixed-version: Fixed from version 3.17rc5"
+CVE_STATUS[CVE-2021-47237] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-6416] = "fixed-version: Fixed from version 3.17rc5"
+CVE_STATUS[CVE-2021-47238] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-6417] = "fixed-version: Fixed from version 3.17rc5"
+CVE_STATUS[CVE-2021-47239] = "fixed-version: Fixed from version 5.12.13"
-CVE_STATUS[CVE-2014-6418] = "fixed-version: Fixed from version 3.17rc5"
+CVE_STATUS[CVE-2021-47240] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-7145] = "fixed-version: Fixed from version 3.17rc2"
+CVE_STATUS[CVE-2021-47241] = "fixed-version: Fixed from version 5.13"
-# Skipping CVE-2014-7207, no affected_versions
+CVE_STATUS[CVE-2021-47242] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-7283] = "fixed-version: Fixed from version 3.15rc1"
+CVE_STATUS[CVE-2021-47243] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-7284] = "fixed-version: Fixed from version 3.15rc7"
+CVE_STATUS[CVE-2021-47244] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-7822] = "fixed-version: Fixed from version 3.16rc1"
+CVE_STATUS[CVE-2021-47245] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-7825] = "fixed-version: Fixed from version 3.18rc3"
+CVE_STATUS[CVE-2021-47246] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-7826] = "fixed-version: Fixed from version 3.18rc3"
+CVE_STATUS[CVE-2021-47247] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-7841] = "fixed-version: Fixed from version 3.18rc5"
+CVE_STATUS[CVE-2021-47248] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-7842] = "fixed-version: Fixed from version 3.18rc1"
+CVE_STATUS[CVE-2021-47249] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-7843] = "fixed-version: Fixed from version 3.18rc5"
+CVE_STATUS[CVE-2021-47250] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-7970] = "fixed-version: Fixed from version 3.18rc1"
+CVE_STATUS[CVE-2021-47251] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-7975] = "fixed-version: Fixed from version 3.18rc1"
+CVE_STATUS[CVE-2021-47252] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8086] = "fixed-version: Fixed from version 3.18rc3"
+CVE_STATUS[CVE-2021-47253] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8133] = "fixed-version: Fixed from version 3.19rc1"
+CVE_STATUS[CVE-2021-47254] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8134] = "fixed-version: Fixed from version 3.19rc1"
+CVE_STATUS[CVE-2021-47255] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8159] = "fixed-version: Fixed from version 4.0rc7"
+CVE_STATUS[CVE-2021-47256] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8160] = "fixed-version: Fixed from version 3.18rc1"
+CVE_STATUS[CVE-2021-47257] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8171] = "fixed-version: Fixed from version 3.12rc1"
+CVE_STATUS[CVE-2021-47258] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8172] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47259] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8173] = "fixed-version: Fixed from version 3.13rc5"
+CVE_STATUS[CVE-2021-47260] = "fixed-version: Fixed from version 5.13"
-# Skipping CVE-2014-8181, no affected_versions
+CVE_STATUS[CVE-2021-47261] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8369] = "fixed-version: Fixed from version 3.18rc2"
+CVE_STATUS[CVE-2021-47262] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8480] = "fixed-version: Fixed from version 3.18rc2"
+CVE_STATUS[CVE-2021-47263] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8481] = "fixed-version: Fixed from version 3.18rc2"
+CVE_STATUS[CVE-2021-47264] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8559] = "fixed-version: Fixed from version 3.19rc1"
+CVE_STATUS[CVE-2021-47265] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8709] = "fixed-version: Fixed from version 3.14rc3"
+CVE_STATUS[CVE-2021-47266] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8884] = "fixed-version: Fixed from version 3.18rc1"
+CVE_STATUS[CVE-2021-47267] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-8989] = "fixed-version: Fixed from version 3.19rc1"
+CVE_STATUS[CVE-2021-47268] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9090] = "fixed-version: Fixed from version 3.18rc6"
+CVE_STATUS[CVE-2021-47269] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9322] = "fixed-version: Fixed from version 3.18rc6"
+CVE_STATUS[CVE-2021-47270] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9419] = "fixed-version: Fixed from version 3.19rc1"
+CVE_STATUS[CVE-2021-47271] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9420] = "fixed-version: Fixed from version 3.19rc1"
+CVE_STATUS[CVE-2021-47272] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9428] = "fixed-version: Fixed from version 3.19rc3"
+CVE_STATUS[CVE-2021-47273] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9529] = "fixed-version: Fixed from version 3.19rc4"
+CVE_STATUS[CVE-2021-47274] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9584] = "fixed-version: Fixed from version 3.19rc3"
+CVE_STATUS[CVE-2021-47275] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9585] = "fixed-version: Fixed from version 3.19rc4"
+CVE_STATUS[CVE-2021-47276] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9644] = "fixed-version: Fixed from version 3.19rc1"
+CVE_STATUS[CVE-2021-47277] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9683] = "fixed-version: Fixed from version 3.19rc1"
+CVE_STATUS[CVE-2021-47278] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9710] = "fixed-version: Fixed from version 3.19rc1"
+CVE_STATUS[CVE-2021-47279] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9715] = "fixed-version: Fixed from version 3.15rc1"
+CVE_STATUS[CVE-2021-47280] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9717] = "fixed-version: Fixed from version 4.1rc1"
+CVE_STATUS[CVE-2021-47281] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9728] = "fixed-version: Fixed from version 3.19rc3"
+CVE_STATUS[CVE-2021-47282] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9729] = "fixed-version: Fixed from version 3.19rc3"
+CVE_STATUS[CVE-2021-47283] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9730] = "fixed-version: Fixed from version 3.19rc3"
+CVE_STATUS[CVE-2021-47284] = "fixed-version: Fixed from version 5.13"
-CVE_STATUS[CVE-2014-9731] = "fixed-version: Fixed from version 3.19rc3"
+CVE_STATUS[CVE-2021-47286] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9777, no affected_versions
+CVE_STATUS[CVE-2021-47287] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9778, no affected_versions
+CVE_STATUS[CVE-2021-47288] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9779, no affected_versions
+CVE_STATUS[CVE-2021-47289] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9780, no affected_versions
+CVE_STATUS[CVE-2021-47290] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9781, no affected_versions
+CVE_STATUS[CVE-2021-47291] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9782, no affected_versions
+CVE_STATUS[CVE-2021-47292] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9783, no affected_versions
+CVE_STATUS[CVE-2021-47293] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9784, no affected_versions
+CVE_STATUS[CVE-2021-47294] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9785, no affected_versions
+CVE_STATUS[CVE-2021-47295] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9786, no affected_versions
+CVE_STATUS[CVE-2021-47296] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9787, no affected_versions
+CVE_STATUS[CVE-2021-47297] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9788, no affected_versions
+CVE_STATUS[CVE-2021-47298] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9789, no affected_versions
+CVE_STATUS[CVE-2021-47299] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2014-9803] = "fixed-version: Fixed from version 3.16rc1"
+CVE_STATUS[CVE-2021-47300] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9863, no affected_versions
+CVE_STATUS[CVE-2021-47301] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9864, no affected_versions
+CVE_STATUS[CVE-2021-47302] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9865, no affected_versions
+CVE_STATUS[CVE-2021-47303] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9866, no affected_versions
+CVE_STATUS[CVE-2021-47304] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9867, no affected_versions
+CVE_STATUS[CVE-2021-47305] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9868, no affected_versions
+CVE_STATUS[CVE-2021-47306] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9869, no affected_versions
+CVE_STATUS[CVE-2021-47307] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2014-9870] = "fixed-version: Fixed from version 3.11rc1"
+CVE_STATUS[CVE-2021-47308] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9871, no affected_versions
+CVE_STATUS[CVE-2021-47309] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9872, no affected_versions
+CVE_STATUS[CVE-2021-47310] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9873, no affected_versions
+CVE_STATUS[CVE-2021-47311] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9874, no affected_versions
+CVE_STATUS[CVE-2021-47312] = "fixed-version: Fixed from version 5.13.5"
-# Skipping CVE-2014-9875, no affected_versions
+CVE_STATUS[CVE-2021-47313] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9876, no affected_versions
+CVE_STATUS[CVE-2021-47314] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9877, no affected_versions
+CVE_STATUS[CVE-2021-47315] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9878, no affected_versions
+CVE_STATUS[CVE-2021-47316] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9879, no affected_versions
+CVE_STATUS[CVE-2021-47317] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9880, no affected_versions
+CVE_STATUS[CVE-2021-47318] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9881, no affected_versions
+CVE_STATUS[CVE-2021-47319] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9882, no affected_versions
+CVE_STATUS[CVE-2021-47320] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9883, no affected_versions
+CVE_STATUS[CVE-2021-47321] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9884, no affected_versions
+CVE_STATUS[CVE-2021-47322] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9885, no affected_versions
+CVE_STATUS[CVE-2021-47323] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9886, no affected_versions
+CVE_STATUS[CVE-2021-47324] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9887, no affected_versions
+CVE_STATUS[CVE-2021-47325] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2014-9888] = "fixed-version: Fixed from version 3.13rc1"
+CVE_STATUS[CVE-2021-47327] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9889, no affected_versions
+CVE_STATUS[CVE-2021-47328] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9890, no affected_versions
+CVE_STATUS[CVE-2021-47329] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9891, no affected_versions
+CVE_STATUS[CVE-2021-47330] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9892, no affected_versions
+CVE_STATUS[CVE-2021-47331] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9893, no affected_versions
+CVE_STATUS[CVE-2021-47332] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9894, no affected_versions
+CVE_STATUS[CVE-2021-47333] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2014-9895] = "fixed-version: Fixed from version 3.11rc1"
+CVE_STATUS[CVE-2021-47334] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9896, no affected_versions
+CVE_STATUS[CVE-2021-47335] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9897, no affected_versions
+CVE_STATUS[CVE-2021-47336] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9898, no affected_versions
+CVE_STATUS[CVE-2021-47337] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9899, no affected_versions
+CVE_STATUS[CVE-2021-47338] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2014-9900, no affected_versions
+CVE_STATUS[CVE-2021-47339] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2014-9903] = "fixed-version: Fixed from version 3.14rc4"
+CVE_STATUS[CVE-2021-47340] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2014-9904] = "fixed-version: Fixed from version 3.17rc1"
+CVE_STATUS[CVE-2021-47341] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2014-9914] = "fixed-version: Fixed from version 3.16rc1"
+CVE_STATUS[CVE-2021-47342] = "fixed-version: Fixed from version 5.10.77"
-CVE_STATUS[CVE-2014-9922] = "fixed-version: Fixed from version 3.18rc2"
+CVE_STATUS[CVE-2021-47343] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2014-9940] = "fixed-version: Fixed from version 3.19rc1"
+CVE_STATUS[CVE-2021-47344] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2015-0239] = "fixed-version: Fixed from version 3.19rc6"
+CVE_STATUS[CVE-2021-47345] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2015-0274] = "fixed-version: Fixed from version 3.15rc5"
+CVE_STATUS[CVE-2021-47346] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2015-0275] = "fixed-version: Fixed from version 4.1rc1"
+CVE_STATUS[CVE-2021-47347] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2015-0777, no affected_versions
+CVE_STATUS[CVE-2021-47348] = "fixed-version: Fixed from version 5.14"
-# Skipping CVE-2015-1328, no affected_versions
+CVE_STATUS[CVE-2021-47349] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2015-1333] = "fixed-version: Fixed from version 4.2rc5"
+CVE_STATUS[CVE-2021-47350] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2015-1339] = "fixed-version: Fixed from version 4.4rc5"
+CVE_STATUS[CVE-2021-47351] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2015-1350] = "fixed-version: Fixed from version 4.9rc1"
+CVE_STATUS[CVE-2021-47352] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2015-1420] = "fixed-version: Fixed from version 4.1rc7"
+CVE_STATUS[CVE-2021-47353] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2015-1421] = "fixed-version: Fixed from version 3.19rc7"
+CVE_STATUS[CVE-2021-47354] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2015-1465] = "fixed-version: Fixed from version 3.19rc7"
+CVE_STATUS[CVE-2021-47355] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2015-1573] = "fixed-version: Fixed from version 3.19rc5"
+CVE_STATUS[CVE-2021-47356] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2015-1593] = "fixed-version: Fixed from version 4.0rc1"
+CVE_STATUS[CVE-2021-47357] = "fixed-version: Fixed from version 5.14"
-CVE_STATUS[CVE-2015-1805] = "fixed-version: Fixed from version 3.16rc1"
+CVE_STATUS[CVE-2021-47358] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-2041] = "fixed-version: Fixed from version 3.19rc7"
+CVE_STATUS[CVE-2021-47359] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-2042] = "fixed-version: Fixed from version 3.19"
+CVE_STATUS[CVE-2021-47360] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-2150] = "fixed-version: Fixed from version 4.0rc4"
+CVE_STATUS[CVE-2021-47361] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-2666] = "fixed-version: Fixed from version 4.0rc1"
+CVE_STATUS[CVE-2021-47362] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-2672] = "fixed-version: Fixed from version 4.0rc3"
+CVE_STATUS[CVE-2021-47363] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-2686] = "fixed-version: Fixed from version 4.0rc6"
+CVE_STATUS[CVE-2021-47364] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-2830] = "fixed-version: Fixed from version 4.0rc3"
+CVE_STATUS[CVE-2021-47365] = "fixed-version: Fixed from version 5.15"
-# CVE-2015-2877 has no known resolution
+CVE_STATUS[CVE-2021-47366] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-2922] = "fixed-version: Fixed from version 4.0rc7"
+CVE_STATUS[CVE-2021-47367] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-2925] = "fixed-version: Fixed from version 4.3rc1"
+CVE_STATUS[CVE-2021-47368] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-3212] = "fixed-version: Fixed from version 4.2rc1"
+CVE_STATUS[CVE-2021-47369] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-3214] = "fixed-version: Fixed from version 2.6.33rc8"
+CVE_STATUS[CVE-2021-47370] = "fixed-version: Fixed from version 5.14.9"
-CVE_STATUS[CVE-2015-3288] = "fixed-version: Fixed from version 4.2rc2"
+CVE_STATUS[CVE-2021-47371] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-3290] = "fixed-version: Fixed from version 4.2rc3"
+CVE_STATUS[CVE-2021-47372] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-3291] = "fixed-version: Fixed from version 4.2rc3"
+CVE_STATUS[CVE-2021-47373] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-3331] = "fixed-version: Fixed from version 4.0rc5"
+CVE_STATUS[CVE-2021-47374] = "fixed-version: Fixed from version 5.15"
-# Skipping CVE-2015-3332, no affected_versions
+CVE_STATUS[CVE-2021-47375] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-3339] = "fixed-version: Fixed from version 4.1rc1"
+CVE_STATUS[CVE-2021-47376] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-3636] = "fixed-version: Fixed from version 4.1rc2"
+CVE_STATUS[CVE-2021-47378] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-4001] = "fixed-version: Fixed from version 4.1rc7"
+CVE_STATUS[CVE-2021-47379] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-4002] = "fixed-version: Fixed from version 4.1rc7"
+CVE_STATUS[CVE-2021-47380] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-4003] = "fixed-version: Fixed from version 4.1rc7"
+CVE_STATUS[CVE-2021-47381] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-4004] = "fixed-version: Fixed from version 4.3rc1"
+CVE_STATUS[CVE-2021-47382] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-4036] = "fixed-version: Fixed from version 4.0rc1"
+CVE_STATUS[CVE-2021-47383] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-4167] = "fixed-version: Fixed from version 4.0rc1"
+CVE_STATUS[CVE-2021-47384] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-4170] = "fixed-version: Fixed from version 3.13rc5"
+CVE_STATUS[CVE-2021-47385] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-4176] = "fixed-version: Fixed from version 4.1rc1"
+CVE_STATUS[CVE-2021-47386] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-4177] = "fixed-version: Fixed from version 4.1rc1"
+CVE_STATUS[CVE-2021-47387] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-4178] = "fixed-version: Fixed from version 4.1rc1"
+CVE_STATUS[CVE-2021-47388] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-4692] = "fixed-version: Fixed from version 4.2rc1"
+CVE_STATUS[CVE-2021-47389] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-4700] = "fixed-version: Fixed from version 4.1rc6"
+CVE_STATUS[CVE-2021-47390] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-5156] = "fixed-version: Fixed from version 4.2rc7"
+CVE_STATUS[CVE-2021-47391] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-5157] = "fixed-version: Fixed from version 4.2rc3"
+CVE_STATUS[CVE-2021-47392] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-5257] = "fixed-version: Fixed from version 4.3rc3"
+CVE_STATUS[CVE-2021-47393] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-5283] = "fixed-version: Fixed from version 4.3rc3"
+CVE_STATUS[CVE-2021-47394] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-5307] = "fixed-version: Fixed from version 4.4rc1"
+CVE_STATUS[CVE-2021-47395] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-5327] = "fixed-version: Fixed from version 4.4rc1"
+CVE_STATUS[CVE-2021-47396] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-5364] = "fixed-version: Fixed from version 4.1rc7"
+CVE_STATUS[CVE-2021-47397] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-5366] = "fixed-version: Fixed from version 4.1rc7"
+CVE_STATUS[CVE-2021-47398] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-5697] = "fixed-version: Fixed from version 4.2rc6"
+CVE_STATUS[CVE-2021-47399] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-5706] = "fixed-version: Fixed from version 4.1rc3"
+CVE_STATUS[CVE-2021-47400] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-5707] = "fixed-version: Fixed from version 4.1rc1"
+CVE_STATUS[CVE-2021-47401] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-6252] = "fixed-version: Fixed from version 4.2rc5"
+CVE_STATUS[CVE-2021-47402] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-6526] = "fixed-version: Fixed from version 4.1rc1"
+CVE_STATUS[CVE-2021-47403] = "fixed-version: Fixed from version 5.15"
-# CVE-2015-6619 has no known resolution
+CVE_STATUS[CVE-2021-47404] = "fixed-version: Fixed from version 5.15"
-# CVE-2015-6646 has no known resolution
+CVE_STATUS[CVE-2021-47405] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-6937] = "fixed-version: Fixed from version 4.3rc1"
+CVE_STATUS[CVE-2021-47406] = "fixed-version: Fixed from version 5.15"
-# Skipping CVE-2015-7312, no affected_versions
+CVE_STATUS[CVE-2021-47407] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-7509] = "fixed-version: Fixed from version 3.7rc1"
+CVE_STATUS[CVE-2021-47408] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-7513] = "fixed-version: Fixed from version 4.4rc7"
+CVE_STATUS[CVE-2021-47409] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-7515] = "fixed-version: Fixed from version 4.4rc6"
+CVE_STATUS[CVE-2021-47410] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-7550] = "fixed-version: Fixed from version 4.4rc8"
+CVE_STATUS[CVE-2021-47412] = "fixed-version: Fixed from version 5.15"
-# Skipping CVE-2015-7553, no affected_versions
+CVE_STATUS[CVE-2021-47413] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-7566] = "fixed-version: Fixed from version 4.5rc2"
+CVE_STATUS[CVE-2021-47414] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-7613] = "fixed-version: Fixed from version 4.3rc4"
+CVE_STATUS[CVE-2021-47415] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-7799] = "fixed-version: Fixed from version 4.4rc1"
+CVE_STATUS[CVE-2021-47416] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-7833] = "fixed-version: Fixed from version 4.6rc6"
+CVE_STATUS[CVE-2021-47417] = "fixed-version: Fixed from version 5.15"
-# Skipping CVE-2015-7837, no affected_versions
+CVE_STATUS[CVE-2021-47418] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-7872] = "fixed-version: Fixed from version 4.3rc7"
+CVE_STATUS[CVE-2021-47419] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-7884] = "fixed-version: Fixed from version 4.4rc1"
+CVE_STATUS[CVE-2021-47420] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-7885] = "fixed-version: Fixed from version 4.4rc1"
+CVE_STATUS[CVE-2021-47421] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-7990] = "fixed-version: Fixed from version 4.4rc4"
+CVE_STATUS[CVE-2021-47422] = "fixed-version: Fixed from version 5.15"
-# Skipping CVE-2015-8019, no affected_versions
+CVE_STATUS[CVE-2021-47423] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8104] = "fixed-version: Fixed from version 4.4rc1"
+CVE_STATUS[CVE-2021-47424] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8215] = "fixed-version: Fixed from version 4.0rc3"
+CVE_STATUS[CVE-2021-47425] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8324] = "fixed-version: Fixed from version 2.6.34rc1"
+CVE_STATUS[CVE-2021-47426] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8374] = "fixed-version: Fixed from version 4.4rc1"
+CVE_STATUS[CVE-2021-47427] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8539] = "fixed-version: Fixed from version 4.4rc3"
+CVE_STATUS[CVE-2021-47428] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8543] = "fixed-version: Fixed from version 4.4rc6"
+CVE_STATUS[CVE-2021-47429] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8550] = "fixed-version: Fixed from version 4.4rc6"
+CVE_STATUS[CVE-2021-47430] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8551] = "fixed-version: Fixed from version 4.4rc6"
+CVE_STATUS[CVE-2021-47431] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8552] = "fixed-version: Fixed from version 4.4rc6"
+CVE_STATUS[CVE-2021-47432] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2015-8553] = "fixed-version: Fixed from version 4.4rc6"
+CVE_STATUS[CVE-2021-47433] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8569] = "fixed-version: Fixed from version 4.4rc6"
+CVE_STATUS[CVE-2021-47434] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8575] = "fixed-version: Fixed from version 4.4rc6"
+CVE_STATUS[CVE-2021-47435] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8660] = "fixed-version: Fixed from version 4.4rc4"
+CVE_STATUS[CVE-2021-47436] = "fixed-version: Fixed from version 5.14.14"
-CVE_STATUS[CVE-2015-8709] = "fixed-version: Fixed from version 4.10rc1"
+CVE_STATUS[CVE-2021-47437] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8746] = "fixed-version: Fixed from version 4.3rc1"
+CVE_STATUS[CVE-2021-47438] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8767] = "fixed-version: Fixed from version 4.3rc4"
+CVE_STATUS[CVE-2021-47439] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8785] = "fixed-version: Fixed from version 4.4rc5"
+CVE_STATUS[CVE-2021-47440] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8787] = "fixed-version: Fixed from version 4.4rc1"
+CVE_STATUS[CVE-2021-47441] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8812] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47442] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8816] = "fixed-version: Fixed from version 4.4rc6"
+CVE_STATUS[CVE-2021-47443] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8830] = "fixed-version: Fixed from version 4.1rc1"
+CVE_STATUS[CVE-2021-47444] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8839] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47445] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8844] = "fixed-version: Fixed from version 4.4rc3"
+CVE_STATUS[CVE-2021-47446] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8845] = "fixed-version: Fixed from version 4.4rc3"
+CVE_STATUS[CVE-2021-47447] = "fixed-version: Fixed from version 5.15"
-# Skipping CVE-2015-8937, no affected_versions
+CVE_STATUS[CVE-2021-47448] = "fixed-version: Fixed from version 5.15"
-# Skipping CVE-2015-8938, no affected_versions
+CVE_STATUS[CVE-2021-47449] = "fixed-version: Fixed from version 5.14.14"
-# Skipping CVE-2015-8939, no affected_versions
+CVE_STATUS[CVE-2021-47450] = "fixed-version: Fixed from version 5.15"
-# Skipping CVE-2015-8940, no affected_versions
+CVE_STATUS[CVE-2021-47451] = "fixed-version: Fixed from version 5.15"
-# Skipping CVE-2015-8941, no affected_versions
+CVE_STATUS[CVE-2021-47452] = "fixed-version: Fixed from version 5.15"
-# Skipping CVE-2015-8942, no affected_versions
+CVE_STATUS[CVE-2021-47453] = "fixed-version: Fixed from version 5.15"
-# Skipping CVE-2015-8943, no affected_versions
+CVE_STATUS[CVE-2021-47454] = "fixed-version: Fixed from version 5.15"
-# Skipping CVE-2015-8944, no affected_versions
+CVE_STATUS[CVE-2021-47455] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8950] = "fixed-version: Fixed from version 4.1rc2"
+CVE_STATUS[CVE-2021-47456] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8952] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47457] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8953] = "fixed-version: Fixed from version 4.3"
+CVE_STATUS[CVE-2021-47458] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8955] = "fixed-version: Fixed from version 4.1rc1"
+CVE_STATUS[CVE-2021-47459] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8956] = "fixed-version: Fixed from version 4.2rc1"
+CVE_STATUS[CVE-2021-47460] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8961] = "fixed-version: Fixed from version 4.4rc1"
+CVE_STATUS[CVE-2021-47461] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8962] = "fixed-version: Fixed from version 4.4rc1"
+CVE_STATUS[CVE-2021-47462] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8963] = "fixed-version: Fixed from version 4.4"
+CVE_STATUS[CVE-2021-47463] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8964] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47464] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8966] = "fixed-version: Fixed from version 4.4rc8"
+CVE_STATUS[CVE-2021-47465] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8967] = "fixed-version: Fixed from version 4.0rc1"
+CVE_STATUS[CVE-2021-47466] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-8970] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47467] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-9004] = "fixed-version: Fixed from version 3.19rc7"
+CVE_STATUS[CVE-2021-47468] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-9016] = "fixed-version: Fixed from version 4.3rc1"
+CVE_STATUS[CVE-2021-47470] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2015-9289] = "fixed-version: Fixed from version 4.2rc1"
+CVE_STATUS[CVE-2021-47471] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-0617] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47473] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-0723] = "fixed-version: Fixed from version 4.5rc2"
+CVE_STATUS[CVE-2021-47474] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-0728] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47475] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-0758] = "fixed-version: Fixed from version 4.6"
+CVE_STATUS[CVE-2021-47476] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2016-0774, no affected_versions
+CVE_STATUS[CVE-2021-47477] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-0821] = "fixed-version: Fixed from version 4.3rc1"
+CVE_STATUS[CVE-2021-47478] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-0823] = "fixed-version: Fixed from version 4.0rc5"
+CVE_STATUS[CVE-2021-47479] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-10044] = "fixed-version: Fixed from version 4.8rc7"
+CVE_STATUS[CVE-2021-47480] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10088] = "fixed-version: Fixed from version 4.10rc1"
+CVE_STATUS[CVE-2021-47481] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10147] = "fixed-version: Fixed from version 4.9"
+CVE_STATUS[CVE-2021-47482] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10150] = "fixed-version: Fixed from version 4.9rc8"
+CVE_STATUS[CVE-2021-47483] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10153] = "fixed-version: Fixed from version 4.10rc1"
+CVE_STATUS[CVE-2021-47484] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10154] = "fixed-version: Fixed from version 4.10rc1"
+CVE_STATUS[CVE-2021-47485] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10200] = "fixed-version: Fixed from version 4.9rc7"
+CVE_STATUS[CVE-2021-47486] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10208] = "fixed-version: Fixed from version 4.10rc1"
+CVE_STATUS[CVE-2021-47489] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10229] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47490] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10318] = "fixed-version: Fixed from version 4.8rc6"
+CVE_STATUS[CVE-2021-47491] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10723] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2021-47492] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10741] = "fixed-version: Fixed from version 4.10rc1"
+CVE_STATUS[CVE-2021-47493] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10764] = "fixed-version: Fixed from version 4.10rc1"
+CVE_STATUS[CVE-2021-47494] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10905] = "fixed-version: Fixed from version 4.8rc1"
+CVE_STATUS[CVE-2021-47495] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10906] = "fixed-version: Fixed from version 4.5rc6"
+CVE_STATUS[CVE-2021-47496] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-10907] = "fixed-version: Fixed from version 4.9rc1"
+CVE_STATUS[CVE-2021-47497] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-1237] = "fixed-version: Fixed from version 4.7rc5"
+CVE_STATUS[CVE-2021-47498] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-1575] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47499] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-1576] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47500] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-1583] = "fixed-version: Fixed from version 4.7rc3"
+CVE_STATUS[CVE-2021-47501] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2053] = "fixed-version: Fixed from version 4.3rc1"
+CVE_STATUS[CVE-2021-47502] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2069] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47503] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2070] = "fixed-version: Fixed from version 4.4"
+CVE_STATUS[CVE-2021-47504] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2085] = "fixed-version: Fixed from version 4.5rc4"
+CVE_STATUS[CVE-2021-47505] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2117] = "fixed-version: Fixed from version 4.6rc5"
+CVE_STATUS[CVE-2021-47506] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2143] = "fixed-version: Fixed from version 4.5"
+CVE_STATUS[CVE-2021-47507] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2184] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47508] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2185] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47509] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2186] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47510] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2187] = "fixed-version: Fixed from version 4.6rc5"
+CVE_STATUS[CVE-2021-47511] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2188] = "fixed-version: Fixed from version 4.11rc2"
+CVE_STATUS[CVE-2021-47512] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2383] = "fixed-version: Fixed from version 4.5rc4"
+CVE_STATUS[CVE-2021-47513] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2384] = "fixed-version: Fixed from version 4.5rc4"
+CVE_STATUS[CVE-2021-47514] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2543] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47515] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2544] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47516] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2545] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47517] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2546] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47518] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2547] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47519] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2548] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47520] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2549] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47521] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2550] = "fixed-version: Fixed from version 4.5rc4"
+CVE_STATUS[CVE-2021-47522] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2782] = "fixed-version: Fixed from version 4.5rc2"
+CVE_STATUS[CVE-2021-47523] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-2847] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2021-47524] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2016-2853, no affected_versions
+CVE_STATUS[CVE-2021-47525] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2016-2854, no affected_versions
+CVE_STATUS[CVE-2021-47526] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3044] = "fixed-version: Fixed from version 4.5"
+CVE_STATUS[CVE-2021-47527] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3070] = "fixed-version: Fixed from version 4.4rc1"
+CVE_STATUS[CVE-2021-47528] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3134] = "fixed-version: Fixed from version 4.6rc2"
+CVE_STATUS[CVE-2021-47529] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3135] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47530] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3136] = "fixed-version: Fixed from version 4.6rc3"
+CVE_STATUS[CVE-2021-47531] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3137] = "fixed-version: Fixed from version 4.6rc3"
+CVE_STATUS[CVE-2021-47532] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3138] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47533] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3139] = "fixed-version: Fixed from version 3.17rc1"
+CVE_STATUS[CVE-2021-47534] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3140] = "fixed-version: Fixed from version 4.6rc3"
+CVE_STATUS[CVE-2021-47535] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3156] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47536] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3157] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47537] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3672] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47538] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3689] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47539] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2016-3695, no affected_versions
+CVE_STATUS[CVE-2021-47540] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2016-3699, no affected_versions
+CVE_STATUS[CVE-2021-47541] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2016-3707, no affected_versions
+CVE_STATUS[CVE-2021-47542] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3713] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2021-47544] = "fixed-version: Fixed from version 5.16"
-# CVE-2016-3775 has no known resolution
+CVE_STATUS[CVE-2021-47546] = "fixed-version: Fixed from version 5.16"
-# CVE-2016-3802 has no known resolution
+CVE_STATUS[CVE-2021-47547] = "fixed-version: Fixed from version 5.16"
-# CVE-2016-3803 has no known resolution
+CVE_STATUS[CVE-2021-47548] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3841] = "fixed-version: Fixed from version 4.4rc4"
+CVE_STATUS[CVE-2021-47549] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3857] = "fixed-version: Fixed from version 4.8rc2"
+CVE_STATUS[CVE-2021-47550] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3951] = "fixed-version: Fixed from version 4.5"
+CVE_STATUS[CVE-2021-47551] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3955] = "fixed-version: Fixed from version 4.6rc3"
+CVE_STATUS[CVE-2021-47552] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-3961] = "fixed-version: Fixed from version 4.6rc5"
+CVE_STATUS[CVE-2021-47553] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4440] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2021-47554] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4470] = "fixed-version: Fixed from version 4.7rc4"
+CVE_STATUS[CVE-2021-47555] = "fixed-version: Fixed from version 5.15.6"
-CVE_STATUS[CVE-2016-4482] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2021-47556] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4485] = "fixed-version: Fixed from version 4.6"
+CVE_STATUS[CVE-2021-47557] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4486] = "fixed-version: Fixed from version 4.6"
+CVE_STATUS[CVE-2021-47558] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4557] = "fixed-version: Fixed from version 4.6rc6"
+CVE_STATUS[CVE-2021-47559] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4558] = "fixed-version: Fixed from version 4.6rc7"
+CVE_STATUS[CVE-2021-47560] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4565] = "fixed-version: Fixed from version 4.6rc6"
+CVE_STATUS[CVE-2021-47561] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4568] = "fixed-version: Fixed from version 4.6rc6"
+CVE_STATUS[CVE-2021-47562] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4569] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2021-47563] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4578] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2021-47564] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4580] = "fixed-version: Fixed from version 4.6"
+CVE_STATUS[CVE-2021-47565] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4581] = "fixed-version: Fixed from version 4.6rc7"
+CVE_STATUS[CVE-2021-47566] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4794] = "fixed-version: Fixed from version 4.7rc4"
+CVE_STATUS[CVE-2021-47567] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4805] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47568] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4913] = "fixed-version: Fixed from version 4.6"
+CVE_STATUS[CVE-2021-47569] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4951] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2021-47570] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4997] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2021-47571] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-4998] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2021-47572] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-5195] = "fixed-version: Fixed from version 4.9rc2"
+CVE_STATUS[CVE-2021-47576] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-5243] = "fixed-version: Fixed from version 4.7rc3"
+CVE_STATUS[CVE-2021-47577] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-5244] = "fixed-version: Fixed from version 4.7rc3"
+CVE_STATUS[CVE-2021-47578] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2016-5340, no affected_versions
+CVE_STATUS[CVE-2021-47579] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2016-5342, no affected_versions
+CVE_STATUS[CVE-2021-47580] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2016-5343, no affected_versions
+CVE_STATUS[CVE-2021-47582] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2016-5344, no affected_versions
+CVE_STATUS[CVE-2021-47583] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-5400] = "fixed-version: Fixed from version 4.7"
+CVE_STATUS[CVE-2021-47584] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-5412] = "fixed-version: Fixed from version 4.8rc1"
+CVE_STATUS[CVE-2021-47585] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-5696] = "fixed-version: Fixed from version 4.7"
+CVE_STATUS[CVE-2021-47586] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-5728] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2021-47587] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-5828] = "fixed-version: Fixed from version 4.7rc6"
+CVE_STATUS[CVE-2021-47588] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-5829] = "fixed-version: Fixed from version 4.7rc5"
+CVE_STATUS[CVE-2021-47589] = "fixed-version: Fixed from version 5.16"
-# CVE-2016-5870 has no known resolution
+CVE_STATUS[CVE-2021-47590] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-6130] = "fixed-version: Fixed from version 4.6rc6"
+CVE_STATUS[CVE-2021-47591] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-6136] = "fixed-version: Fixed from version 4.8rc1"
+CVE_STATUS[CVE-2021-47592] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-6156] = "fixed-version: Fixed from version 4.7rc7"
+CVE_STATUS[CVE-2021-47593] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-6162] = "fixed-version: Fixed from version 4.7"
+CVE_STATUS[CVE-2021-47594] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-6187] = "fixed-version: Fixed from version 4.7rc7"
+CVE_STATUS[CVE-2021-47595] = "fixed-version: Fixed from version 5.15.11"
-CVE_STATUS[CVE-2016-6197] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47596] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-6198] = "fixed-version: Fixed from version 4.6"
+CVE_STATUS[CVE-2021-47597] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-6213] = "fixed-version: Fixed from version 4.9rc1"
+CVE_STATUS[CVE-2021-47598] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-6327] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47599] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-6480] = "fixed-version: Fixed from version 4.8rc3"
+CVE_STATUS[CVE-2021-47600] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-6516] = "fixed-version: Fixed from version 4.8rc1"
+CVE_STATUS[CVE-2021-47601] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2016-6753, no affected_versions
+CVE_STATUS[CVE-2021-47602] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-6786] = "fixed-version: Fixed from version 4.0rc1"
+CVE_STATUS[CVE-2021-47603] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-6787] = "fixed-version: Fixed from version 4.0rc1"
+CVE_STATUS[CVE-2021-47604] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-6828] = "fixed-version: Fixed from version 4.8rc5"
+CVE_STATUS[CVE-2021-47605] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-7039] = "fixed-version: Fixed from version 4.9rc4"
+CVE_STATUS[CVE-2021-47606] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-7042] = "fixed-version: Fixed from version 4.9rc3"
+CVE_STATUS[CVE-2021-47607] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-7097] = "fixed-version: Fixed from version 4.9rc1"
+CVE_STATUS[CVE-2021-47608] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-7117] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47609] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2016-7118, no affected_versions
+CVE_STATUS[CVE-2021-47610] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-7425] = "fixed-version: Fixed from version 4.9rc1"
+CVE_STATUS[CVE-2021-47611] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-7910] = "fixed-version: Fixed from version 4.8rc1"
+CVE_STATUS[CVE-2021-47612] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-7911] = "fixed-version: Fixed from version 4.7rc7"
+CVE_STATUS[CVE-2021-47613] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-7912] = "fixed-version: Fixed from version 4.6rc5"
+CVE_STATUS[CVE-2021-47614] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-7913] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47616] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-7914] = "fixed-version: Fixed from version 4.6rc4"
+CVE_STATUS[CVE-2021-47617] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2016-7915] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47618] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2016-7916] = "fixed-version: Fixed from version 4.6rc7"
+CVE_STATUS[CVE-2021-47619] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2016-7917] = "fixed-version: Fixed from version 4.5rc6"
+CVE_STATUS[CVE-2021-47620] = "fixed-version: Fixed from version 5.16.5"
-CVE_STATUS[CVE-2016-8399] = "fixed-version: Fixed from version 4.9"
+CVE_STATUS[CVE-2021-47622] = "fixed-version: Fixed from version 5.17"
-# Skipping CVE-2016-8401, no affected_versions
+CVE_STATUS[CVE-2021-47623] = "fixed-version: Fixed from version 5.17"
-# Skipping CVE-2016-8402, no affected_versions
+CVE_STATUS[CVE-2021-47624] = "fixed-version: Fixed from version 5.17"
-# Skipping CVE-2016-8403, no affected_versions
+CVE_STATUS[CVE-2021-47631] = "fixed-version: Fixed from version 5.18"
-# Skipping CVE-2016-8404, no affected_versions
+CVE_STATUS[CVE-2021-47632] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-8405] = "fixed-version: Fixed from version 4.10rc6"
+CVE_STATUS[CVE-2021-47633] = "fixed-version: Fixed from version 5.18"
-# Skipping CVE-2016-8406, no affected_versions
+CVE_STATUS[CVE-2021-47634] = "fixed-version: Fixed from version 5.18"
-# Skipping CVE-2016-8407, no affected_versions
+CVE_STATUS[CVE-2021-47635] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-8630] = "fixed-version: Fixed from version 4.9rc4"
+CVE_STATUS[CVE-2021-47636] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-8632] = "fixed-version: Fixed from version 4.9rc8"
+CVE_STATUS[CVE-2021-47637] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-8633] = "fixed-version: Fixed from version 4.9rc4"
+CVE_STATUS[CVE-2021-47638] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-8636] = "fixed-version: Fixed from version 4.10rc8"
+CVE_STATUS[CVE-2021-47639] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-8645] = "fixed-version: Fixed from version 4.9rc6"
+CVE_STATUS[CVE-2021-47640] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-8646] = "fixed-version: Fixed from version 4.4rc1"
+CVE_STATUS[CVE-2021-47641] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-8650] = "fixed-version: Fixed from version 4.9rc7"
+CVE_STATUS[CVE-2021-47642] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-8655] = "fixed-version: Fixed from version 4.9rc8"
+CVE_STATUS[CVE-2021-47643] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-8658] = "fixed-version: Fixed from version 4.8rc7"
+CVE_STATUS[CVE-2021-47644] = "fixed-version: Fixed from version 5.18"
-# CVE-2016-8660 has no known resolution
+CVE_STATUS[CVE-2021-47645] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-8666] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47646] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-9083] = "fixed-version: Fixed from version 4.9rc4"
+CVE_STATUS[CVE-2021-47647] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-9084] = "fixed-version: Fixed from version 4.9rc4"
+CVE_STATUS[CVE-2021-47648] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-9120] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47649] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-9178] = "fixed-version: Fixed from version 4.8rc7"
+CVE_STATUS[CVE-2021-47650] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-9191] = "fixed-version: Fixed from version 4.10rc4"
+CVE_STATUS[CVE-2021-47651] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-9313] = "fixed-version: Fixed from version 4.9rc3"
+CVE_STATUS[CVE-2021-47652] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-9555] = "fixed-version: Fixed from version 4.9rc4"
+CVE_STATUS[CVE-2021-47653] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-9576] = "fixed-version: Fixed from version 4.9"
+CVE_STATUS[CVE-2021-47654] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-9588] = "fixed-version: Fixed from version 4.10rc1"
+CVE_STATUS[CVE-2021-47655] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-9604] = "fixed-version: Fixed from version 4.11rc8"
+CVE_STATUS[CVE-2021-47656] = "fixed-version: Fixed from version 5.18"
-# Skipping CVE-2016-9644, no affected_versions
+CVE_STATUS[CVE-2021-47657] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2016-9685] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2021-47658] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2016-9754] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2021-47659] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2016-9755] = "fixed-version: Fixed from version 4.9rc8"
+CVE_STATUS[CVE-2021-47660] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2016-9756] = "fixed-version: Fixed from version 4.9rc7"
+CVE_STATUS[CVE-2021-47668] = "fixed-version: Fixed from version 5.11"
-CVE_STATUS[CVE-2016-9777] = "fixed-version: Fixed from version 4.9rc7"
+CVE_STATUS[CVE-2021-47669] = "fixed-version: Fixed from version 5.11"
-CVE_STATUS[CVE-2016-9793] = "fixed-version: Fixed from version 4.9rc8"
+CVE_STATUS[CVE-2021-47670] = "fixed-version: Fixed from version 5.11"
-CVE_STATUS[CVE-2016-9794] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2021-47671] = "fixed-version: Fixed from version 5.16"
-CVE_STATUS[CVE-2016-9806] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2021-4439] = "fixed-version: Fixed from version 5.15"
-CVE_STATUS[CVE-2016-9919] = "fixed-version: Fixed from version 4.9rc8"
+CVE_STATUS[CVE-2021-4440] = "fixed-version: Fixed from version 5.10.218"
-# Skipping CVE-2017-0403, no affected_versions
+CVE_STATUS[CVE-2021-4441] = "fixed-version: Fixed from version 5.17"
-# Skipping CVE-2017-0404, no affected_versions
+CVE_STATUS[CVE-2021-4442] = "fixed-version: Fixed from version 5.12"
-# Skipping CVE-2017-0426, no affected_versions
+CVE_STATUS[CVE-2021-4453] = "fixed-version: Fixed from version 5.16"
-# Skipping CVE-2017-0427, no affected_versions
+CVE_STATUS[CVE-2021-4454] = "fixed-version: Fixed from version 6.2"
-# CVE-2017-0507 has no known resolution
+CVE_STATUS[CVE-2021-4460] = "fixed-version: Fixed from version 5.13"
-# CVE-2017-0508 has no known resolution
+CVE_STATUS[CVE-2022-21546] = "fixed-version: Fixed from version 5.19"
-# Skipping CVE-2017-0510, no affected_versions
+# CVE-2022-26365 has no known resolution
-# Skipping CVE-2017-0528, no affected_versions
+# CVE-2022-33740 has no known resolution
-# Skipping CVE-2017-0537, no affected_versions
+# CVE-2022-33741 has no known resolution
-# CVE-2017-0564 has no known resolution
+# CVE-2022-33742 has no known resolution
-CVE_STATUS[CVE-2017-0605] = "fixed-version: Fixed from version 4.12rc1"
+# CVE-2022-33743 has no known resolution
-CVE_STATUS[CVE-2017-0627] = "fixed-version: Fixed from version 4.14rc1"
+# CVE-2022-33744 has no known resolution
-# CVE-2017-0630 has no known resolution
+# CVE-2022-3643 has no known resolution
-# CVE-2017-0749 has no known resolution
+# CVE-2022-42328 has no known resolution
-CVE_STATUS[CVE-2017-0750] = "fixed-version: Fixed from version 4.5rc1"
+# CVE-2022-42329 has no known resolution
-CVE_STATUS[CVE-2017-0786] = "fixed-version: Fixed from version 4.14rc4"
+CVE_STATUS[CVE-2022-48626] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-0861] = "fixed-version: Fixed from version 4.15rc3"
+CVE_STATUS[CVE-2022-48627] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2017-1000] = "fixed-version: Fixed from version 4.13rc5"
+CVE_STATUS[CVE-2022-48628] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2017-1000111] = "fixed-version: Fixed from version 4.13rc5"
+CVE_STATUS[CVE-2022-48629] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-1000112] = "fixed-version: Fixed from version 4.13rc5"
+CVE_STATUS[CVE-2022-48630] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2017-1000251] = "fixed-version: Fixed from version 4.14rc1"
+CVE_STATUS[CVE-2022-48631] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-1000252] = "fixed-version: Fixed from version 4.14rc1"
+CVE_STATUS[CVE-2022-48632] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-1000253] = "fixed-version: Fixed from version 4.1rc1"
+CVE_STATUS[CVE-2022-48633] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-1000255] = "fixed-version: Fixed from version 4.14rc5"
+CVE_STATUS[CVE-2022-48634] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-1000363] = "fixed-version: Fixed from version 4.12rc2"
+CVE_STATUS[CVE-2022-48635] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-1000364] = "fixed-version: Fixed from version 4.12rc6"
+CVE_STATUS[CVE-2022-48636] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-1000365] = "fixed-version: Fixed from version 4.12rc7"
+CVE_STATUS[CVE-2022-48637] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-1000370] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48638] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-1000371] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48639] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-1000379] = "fixed-version: Fixed from version 4.12rc6"
+CVE_STATUS[CVE-2022-48640] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-1000380] = "fixed-version: Fixed from version 4.12rc5"
+CVE_STATUS[CVE-2022-48641] = "fixed-version: Fixed from version 5.19.12"
-CVE_STATUS[CVE-2017-1000405] = "fixed-version: Fixed from version 4.15rc2"
+CVE_STATUS[CVE-2022-48642] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-1000407] = "fixed-version: Fixed from version 4.15rc3"
+CVE_STATUS[CVE-2022-48643] = "fixed-version: Fixed from version 5.19.12"
-CVE_STATUS[CVE-2017-1000410] = "fixed-version: Fixed from version 4.15rc8"
+CVE_STATUS[CVE-2022-48644] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-10661] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48645] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-10662] = "fixed-version: Fixed from version 4.12rc1"
+CVE_STATUS[CVE-2022-48646] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-10663] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48647] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-10810] = "fixed-version: Fixed from version 4.12rc1"
+CVE_STATUS[CVE-2022-48648] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-10911] = "fixed-version: Fixed from version 4.12rc7"
+CVE_STATUS[CVE-2022-48649] = "fixed-version: Fixed from version 5.19.12"
-CVE_STATUS[CVE-2017-11089] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48650] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-11176] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48651] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-11472] = "fixed-version: Fixed from version 4.12rc1"
+CVE_STATUS[CVE-2022-48652] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-11473] = "fixed-version: Fixed from version 4.13rc2"
+CVE_STATUS[CVE-2022-48653] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-11600] = "fixed-version: Fixed from version 4.13"
+CVE_STATUS[CVE-2022-48654] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-12134] = "fixed-version: Fixed from version 4.13rc6"
+CVE_STATUS[CVE-2022-48655] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-12146] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48656] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-12153] = "fixed-version: Fixed from version 4.14rc2"
+CVE_STATUS[CVE-2022-48657] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-12154] = "fixed-version: Fixed from version 4.14rc1"
+CVE_STATUS[CVE-2022-48658] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-12168] = "fixed-version: Fixed from version 4.9rc6"
+CVE_STATUS[CVE-2022-48659] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-12188] = "fixed-version: Fixed from version 4.14rc5"
+CVE_STATUS[CVE-2022-48660] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-12190] = "fixed-version: Fixed from version 4.14rc5"
+CVE_STATUS[CVE-2022-48661] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-12192] = "fixed-version: Fixed from version 4.14rc3"
+CVE_STATUS[CVE-2022-48662] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-12193] = "fixed-version: Fixed from version 4.14rc7"
+CVE_STATUS[CVE-2022-48663] = "fixed-version: Fixed from version 5.19.12"
-CVE_STATUS[CVE-2017-12762] = "fixed-version: Fixed from version 4.13rc4"
+CVE_STATUS[CVE-2022-48664] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-13080] = "fixed-version: Fixed from version 4.14rc6"
+CVE_STATUS[CVE-2022-48665] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-13166] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-48666] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-13167] = "fixed-version: Fixed from version 4.5rc4"
+CVE_STATUS[CVE-2022-48667] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-13168] = "fixed-version: Fixed from version 4.18rc4"
+CVE_STATUS[CVE-2022-48668] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-13215] = "fixed-version: Fixed from version 4.5rc1"
+CVE_STATUS[CVE-2022-48669] = "cpe-stable-backport: Backported in 6.6.23"
-CVE_STATUS[CVE-2017-13216] = "fixed-version: Fixed from version 4.15rc8"
+CVE_STATUS[CVE-2022-48670] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-13220] = "fixed-version: Fixed from version 3.19rc3"
+CVE_STATUS[CVE-2022-48671] = "fixed-version: Fixed from version 5.19.11"
-# CVE-2017-13221 has no known resolution
+CVE_STATUS[CVE-2022-48672] = "fixed-version: Fixed from version 6.0"
-# CVE-2017-13222 has no known resolution
+CVE_STATUS[CVE-2022-48673] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-13305] = "fixed-version: Fixed from version 4.12rc5"
+CVE_STATUS[CVE-2022-48674] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-13686] = "fixed-version: Fixed from version 4.13rc7"
+CVE_STATUS[CVE-2022-48675] = "fixed-version: Fixed from version 6.0"
-# CVE-2017-13693 has no known resolution
+CVE_STATUS[CVE-2022-48686] = "fixed-version: Fixed from version 6.0"
-# CVE-2017-13694 has no known resolution
+CVE_STATUS[CVE-2022-48687] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-13695] = "fixed-version: Fixed from version 4.17rc1"
+CVE_STATUS[CVE-2022-48688] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-13715] = "fixed-version: Fixed from version 4.3rc1"
+CVE_STATUS[CVE-2022-48689] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-14051] = "fixed-version: Fixed from version 4.14rc1"
+CVE_STATUS[CVE-2022-48690] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-14106] = "fixed-version: Fixed from version 4.12rc3"
+CVE_STATUS[CVE-2022-48691] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-14140] = "fixed-version: Fixed from version 4.13rc6"
+CVE_STATUS[CVE-2022-48692] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-14156] = "fixed-version: Fixed from version 4.14rc1"
+CVE_STATUS[CVE-2022-48693] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-14340] = "fixed-version: Fixed from version 4.14rc1"
+CVE_STATUS[CVE-2022-48694] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-14489] = "fixed-version: Fixed from version 4.14rc3"
+CVE_STATUS[CVE-2022-48695] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-14497] = "fixed-version: Fixed from version 4.13"
+CVE_STATUS[CVE-2022-48696] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-14954] = "fixed-version: Fixed from version 4.14rc3"
+CVE_STATUS[CVE-2022-48697] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-14991] = "fixed-version: Fixed from version 4.14rc2"
+CVE_STATUS[CVE-2022-48698] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-15102] = "fixed-version: Fixed from version 4.9rc1"
+CVE_STATUS[CVE-2022-48699] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-15115] = "fixed-version: Fixed from version 4.14rc6"
+CVE_STATUS[CVE-2022-48701] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-15116] = "fixed-version: Fixed from version 4.2rc1"
+CVE_STATUS[CVE-2022-48702] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-15121] = "fixed-version: Fixed from version 3.11rc1"
+CVE_STATUS[CVE-2022-48703] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-15126] = "fixed-version: Fixed from version 4.14rc4"
+CVE_STATUS[CVE-2022-48704] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-15127] = "fixed-version: Fixed from version 4.13rc5"
+CVE_STATUS[CVE-2022-48705] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2017-15128] = "fixed-version: Fixed from version 4.14rc8"
+CVE_STATUS[CVE-2022-48706] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-15129] = "fixed-version: Fixed from version 4.15rc5"
+CVE_STATUS[CVE-2022-48707] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-15265] = "fixed-version: Fixed from version 4.14rc5"
+CVE_STATUS[CVE-2022-48708] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-15274] = "fixed-version: Fixed from version 4.12rc5"
+CVE_STATUS[CVE-2022-48709] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-15299] = "fixed-version: Fixed from version 4.14rc6"
+CVE_STATUS[CVE-2022-48710] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2017-15306] = "fixed-version: Fixed from version 4.14rc7"
+CVE_STATUS[CVE-2022-48711] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-15537] = "fixed-version: Fixed from version 4.14rc3"
+CVE_STATUS[CVE-2022-48712] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-15649] = "fixed-version: Fixed from version 4.14rc4"
+CVE_STATUS[CVE-2022-48713] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-15868] = "fixed-version: Fixed from version 3.19rc3"
+CVE_STATUS[CVE-2022-48714] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-15951] = "fixed-version: Fixed from version 4.14rc6"
+CVE_STATUS[CVE-2022-48715] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16525] = "fixed-version: Fixed from version 4.14rc5"
+CVE_STATUS[CVE-2022-48716] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16526] = "fixed-version: Fixed from version 4.14rc4"
+CVE_STATUS[CVE-2022-48717] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16527] = "fixed-version: Fixed from version 4.14rc5"
+CVE_STATUS[CVE-2022-48718] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16528] = "fixed-version: Fixed from version 4.14rc1"
+CVE_STATUS[CVE-2022-48719] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16529] = "fixed-version: Fixed from version 4.14rc4"
+CVE_STATUS[CVE-2022-48720] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16530] = "fixed-version: Fixed from version 4.14rc4"
+CVE_STATUS[CVE-2022-48721] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16531] = "fixed-version: Fixed from version 4.14rc4"
+CVE_STATUS[CVE-2022-48722] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16532] = "fixed-version: Fixed from version 4.14rc5"
+CVE_STATUS[CVE-2022-48723] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16533] = "fixed-version: Fixed from version 4.14rc5"
+CVE_STATUS[CVE-2022-48724] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16534] = "fixed-version: Fixed from version 4.14rc4"
+CVE_STATUS[CVE-2022-48725] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16535] = "fixed-version: Fixed from version 4.14rc6"
+CVE_STATUS[CVE-2022-48726] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16536] = "fixed-version: Fixed from version 4.15rc1"
+CVE_STATUS[CVE-2022-48727] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16537] = "fixed-version: Fixed from version 4.15rc1"
+CVE_STATUS[CVE-2022-48728] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16538] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-48729] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16643] = "fixed-version: Fixed from version 4.14rc7"
+CVE_STATUS[CVE-2022-48730] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16644] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-48731] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16645] = "fixed-version: Fixed from version 4.14rc6"
+CVE_STATUS[CVE-2022-48732] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16646] = "fixed-version: Fixed from version 4.15rc1"
+CVE_STATUS[CVE-2022-48733] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16647] = "fixed-version: Fixed from version 4.14"
+CVE_STATUS[CVE-2022-48734] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16648] = "fixed-version: Fixed from version 4.15rc1"
+CVE_STATUS[CVE-2022-48735] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16649] = "fixed-version: Fixed from version 4.14"
+CVE_STATUS[CVE-2022-48738] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16650] = "fixed-version: Fixed from version 4.14"
+CVE_STATUS[CVE-2022-48739] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16911] = "fixed-version: Fixed from version 4.15rc4"
+CVE_STATUS[CVE-2022-48740] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16912] = "fixed-version: Fixed from version 4.15rc4"
+CVE_STATUS[CVE-2022-48741] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16913] = "fixed-version: Fixed from version 4.15rc4"
+CVE_STATUS[CVE-2022-48742] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16914] = "fixed-version: Fixed from version 4.15rc4"
+CVE_STATUS[CVE-2022-48743] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16939] = "fixed-version: Fixed from version 4.14rc7"
+CVE_STATUS[CVE-2022-48744] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16994] = "fixed-version: Fixed from version 4.15rc1"
+CVE_STATUS[CVE-2022-48745] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16995] = "fixed-version: Fixed from version 4.15rc5"
+CVE_STATUS[CVE-2022-48746] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-16996] = "fixed-version: Fixed from version 4.15rc5"
+CVE_STATUS[CVE-2022-48747] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17052] = "fixed-version: Fixed from version 4.13rc7"
+CVE_STATUS[CVE-2022-48748] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17053] = "fixed-version: Fixed from version 4.13rc7"
+CVE_STATUS[CVE-2022-48749] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17448] = "fixed-version: Fixed from version 4.15rc4"
+CVE_STATUS[CVE-2022-48750] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17449] = "fixed-version: Fixed from version 4.15rc4"
+CVE_STATUS[CVE-2022-48751] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17450] = "fixed-version: Fixed from version 4.15rc4"
+CVE_STATUS[CVE-2022-48752] = "fixed-version: Fixed from version 5.16.5"
-CVE_STATUS[CVE-2017-17558] = "fixed-version: Fixed from version 4.15rc4"
+CVE_STATUS[CVE-2022-48753] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17712] = "fixed-version: Fixed from version 4.15rc4"
+CVE_STATUS[CVE-2022-48754] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17741] = "fixed-version: Fixed from version 4.15rc5"
+CVE_STATUS[CVE-2022-48755] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17805] = "fixed-version: Fixed from version 4.15rc4"
+CVE_STATUS[CVE-2022-48756] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17806] = "fixed-version: Fixed from version 4.15rc4"
+CVE_STATUS[CVE-2022-48757] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17807] = "fixed-version: Fixed from version 4.15rc3"
+CVE_STATUS[CVE-2022-48758] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17852] = "fixed-version: Fixed from version 4.15rc5"
+CVE_STATUS[CVE-2022-48759] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17853] = "fixed-version: Fixed from version 4.15rc5"
+CVE_STATUS[CVE-2022-48760] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17854] = "fixed-version: Fixed from version 4.15rc5"
+CVE_STATUS[CVE-2022-48761] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17855] = "fixed-version: Fixed from version 4.15rc5"
+CVE_STATUS[CVE-2022-48762] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17856] = "fixed-version: Fixed from version 4.15rc5"
+CVE_STATUS[CVE-2022-48763] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17857] = "fixed-version: Fixed from version 4.15rc5"
+CVE_STATUS[CVE-2022-48764] = "fixed-version: Fixed from version 5.16.5"
-CVE_STATUS[CVE-2017-17862] = "fixed-version: Fixed from version 4.15rc1"
+CVE_STATUS[CVE-2022-48765] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17863] = "fixed-version: Fixed from version 4.15rc5"
+CVE_STATUS[CVE-2022-48766] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17864] = "fixed-version: Fixed from version 4.15rc5"
+CVE_STATUS[CVE-2022-48767] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-17975] = "fixed-version: Fixed from version 4.17rc1"
+CVE_STATUS[CVE-2022-48768] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18017] = "fixed-version: Fixed from version 4.11rc7"
+CVE_STATUS[CVE-2022-48769] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18075] = "fixed-version: Fixed from version 4.15rc7"
+CVE_STATUS[CVE-2022-48770] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18079] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48771] = "fixed-version: Fixed from version 5.17"
-# CVE-2017-18169 has no known resolution
+CVE_STATUS[CVE-2022-48772] = "cpe-stable-backport: Backported in 6.6.34"
-CVE_STATUS[CVE-2017-18174] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2022-48773] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18193] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48774] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18200] = "fixed-version: Fixed from version 4.14rc5"
+CVE_STATUS[CVE-2022-48775] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18202] = "fixed-version: Fixed from version 4.15rc2"
+CVE_STATUS[CVE-2022-48776] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18203] = "fixed-version: Fixed from version 4.15rc1"
+CVE_STATUS[CVE-2022-48777] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18204] = "fixed-version: Fixed from version 4.15rc1"
+CVE_STATUS[CVE-2022-48778] = "fixed-version: Fixed from version 5.16.11"
-CVE_STATUS[CVE-2017-18208] = "fixed-version: Fixed from version 4.15rc2"
+CVE_STATUS[CVE-2022-48779] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18216] = "fixed-version: Fixed from version 4.15rc1"
+CVE_STATUS[CVE-2022-48780] = "fixed-version: Fixed from version 5.16.11"
-CVE_STATUS[CVE-2017-18218] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48781] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18221] = "fixed-version: Fixed from version 4.12rc4"
+CVE_STATUS[CVE-2022-48782] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18222] = "fixed-version: Fixed from version 4.12rc1"
+CVE_STATUS[CVE-2022-48783] = "fixed-version: Fixed from version 5.16.11"
-CVE_STATUS[CVE-2017-18224] = "fixed-version: Fixed from version 4.15rc1"
+CVE_STATUS[CVE-2022-48784] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18232] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-48785] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18241] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48786] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18249] = "fixed-version: Fixed from version 4.12rc1"
+CVE_STATUS[CVE-2022-48787] = "fixed-version: Fixed from version 5.16.11"
-CVE_STATUS[CVE-2017-18255] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48788] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18257] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48789] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18261] = "fixed-version: Fixed from version 4.13rc6"
+CVE_STATUS[CVE-2022-48790] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18270] = "fixed-version: Fixed from version 4.14rc3"
+CVE_STATUS[CVE-2022-48791] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18344] = "fixed-version: Fixed from version 4.15rc4"
+CVE_STATUS[CVE-2022-48792] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18360] = "fixed-version: Fixed from version 4.12rc2"
+CVE_STATUS[CVE-2022-48793] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18379] = "fixed-version: Fixed from version 4.14rc3"
+CVE_STATUS[CVE-2022-48794] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18509] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48795] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18549] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48796] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18550] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48797] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18551] = "fixed-version: Fixed from version 4.15rc9"
+CVE_STATUS[CVE-2022-48798] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18552] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48799] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-18595] = "fixed-version: Fixed from version 4.15rc6"
+CVE_STATUS[CVE-2022-48800] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-2583] = "fixed-version: Fixed from version 4.10rc4"
+CVE_STATUS[CVE-2022-48801] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-2584] = "fixed-version: Fixed from version 4.10rc4"
+CVE_STATUS[CVE-2022-48802] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-2596] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48803] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-2618] = "fixed-version: Fixed from version 4.10rc8"
+CVE_STATUS[CVE-2022-48804] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-2634] = "fixed-version: Fixed from version 2.6.25rc1"
+CVE_STATUS[CVE-2022-48805] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-2636] = "fixed-version: Fixed from version 4.11rc2"
+CVE_STATUS[CVE-2022-48806] = "fixed-version: Fixed from version 5.16.10"
-CVE_STATUS[CVE-2017-2647] = "fixed-version: Fixed from version 3.18rc1"
+CVE_STATUS[CVE-2022-48807] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-2671] = "fixed-version: Fixed from version 4.11rc6"
+CVE_STATUS[CVE-2022-48808] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5123] = "fixed-version: Fixed from version 4.14rc5"
+CVE_STATUS[CVE-2022-48809] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5546] = "fixed-version: Fixed from version 4.10rc4"
+CVE_STATUS[CVE-2022-48810] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5547] = "fixed-version: Fixed from version 4.10rc5"
+CVE_STATUS[CVE-2022-48811] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5548] = "fixed-version: Fixed from version 4.10rc5"
+CVE_STATUS[CVE-2022-48812] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5549] = "fixed-version: Fixed from version 4.10rc4"
+CVE_STATUS[CVE-2022-48813] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5550] = "fixed-version: Fixed from version 4.10rc4"
+CVE_STATUS[CVE-2022-48814] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5551] = "fixed-version: Fixed from version 4.10rc4"
+CVE_STATUS[CVE-2022-48815] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5576] = "fixed-version: Fixed from version 4.10rc6"
+CVE_STATUS[CVE-2022-48816] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5577] = "fixed-version: Fixed from version 4.10rc6"
+CVE_STATUS[CVE-2022-48817] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5669] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48818] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5715] = "fixed-version: Fixed from version 4.15rc8"
+CVE_STATUS[CVE-2022-48819] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5753] = "fixed-version: Fixed from version 4.15rc8"
+CVE_STATUS[CVE-2022-48820] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5754] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-48821] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5897] = "fixed-version: Fixed from version 4.10rc8"
+CVE_STATUS[CVE-2022-48822] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5967] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48823] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5970] = "fixed-version: Fixed from version 4.10rc8"
+CVE_STATUS[CVE-2022-48824] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5972] = "fixed-version: Fixed from version 4.4rc1"
+CVE_STATUS[CVE-2022-48825] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-5986] = "fixed-version: Fixed from version 4.10rc8"
+CVE_STATUS[CVE-2022-48826] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-6001] = "fixed-version: Fixed from version 4.10rc4"
+CVE_STATUS[CVE-2022-48827] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-6074] = "fixed-version: Fixed from version 4.10"
+CVE_STATUS[CVE-2022-48828] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-6214] = "fixed-version: Fixed from version 4.10rc8"
+CVE_STATUS[CVE-2022-48829] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-6345] = "fixed-version: Fixed from version 4.10"
+CVE_STATUS[CVE-2022-48830] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-6346] = "fixed-version: Fixed from version 4.10"
+CVE_STATUS[CVE-2022-48831] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-6347] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48832] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-6348] = "fixed-version: Fixed from version 4.10"
+CVE_STATUS[CVE-2022-48833] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-6353] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48834] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-6874] = "fixed-version: Fixed from version 4.11rc2"
+CVE_STATUS[CVE-2022-48835] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-6951] = "fixed-version: Fixed from version 3.18rc1"
+CVE_STATUS[CVE-2022-48836] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7184] = "fixed-version: Fixed from version 4.11rc5"
+CVE_STATUS[CVE-2022-48837] = "fixed-version: Fixed from version 5.16.17"
-CVE_STATUS[CVE-2017-7187] = "fixed-version: Fixed from version 4.11rc5"
+CVE_STATUS[CVE-2022-48838] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7261] = "fixed-version: Fixed from version 4.11rc6"
+CVE_STATUS[CVE-2022-48839] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7273] = "fixed-version: Fixed from version 4.10rc4"
+CVE_STATUS[CVE-2022-48840] = "fixed-version: Fixed from version 5.16.17"
-CVE_STATUS[CVE-2017-7277] = "fixed-version: Fixed from version 4.11rc4"
+CVE_STATUS[CVE-2022-48841] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7294] = "fixed-version: Fixed from version 4.11rc6"
+CVE_STATUS[CVE-2022-48842] = "fixed-version: Fixed from version 5.16.16"
-CVE_STATUS[CVE-2017-7308] = "fixed-version: Fixed from version 4.11rc6"
+CVE_STATUS[CVE-2022-48844] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7346] = "fixed-version: Fixed from version 4.12rc5"
+CVE_STATUS[CVE-2022-48845] = "fixed-version: Fixed from version 5.17"
-# CVE-2017-7369 has no known resolution
+CVE_STATUS[CVE-2022-48846] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7374] = "fixed-version: Fixed from version 4.11rc4"
+CVE_STATUS[CVE-2022-48847] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7472] = "fixed-version: Fixed from version 4.11rc8"
+CVE_STATUS[CVE-2022-48848] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7477] = "fixed-version: Fixed from version 4.11"
+CVE_STATUS[CVE-2022-48849] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7482] = "fixed-version: Fixed from version 4.12rc7"
+CVE_STATUS[CVE-2022-48850] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7487] = "fixed-version: Fixed from version 4.12rc1"
+CVE_STATUS[CVE-2022-48851] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7495] = "fixed-version: Fixed from version 4.7rc1"
+CVE_STATUS[CVE-2022-48852] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7518] = "fixed-version: Fixed from version 4.12rc7"
+CVE_STATUS[CVE-2022-48853] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2017-7533] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48854] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7541] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48855] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7542] = "fixed-version: Fixed from version 4.13rc2"
+CVE_STATUS[CVE-2022-48856] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7558] = "fixed-version: Fixed from version 4.13"
+CVE_STATUS[CVE-2022-48857] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7616] = "fixed-version: Fixed from version 4.11rc6"
+CVE_STATUS[CVE-2022-48858] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7618] = "fixed-version: Fixed from version 4.11rc8"
+CVE_STATUS[CVE-2022-48859] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7645] = "fixed-version: Fixed from version 4.11"
+CVE_STATUS[CVE-2022-48860] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7889] = "fixed-version: Fixed from version 4.11rc7"
+CVE_STATUS[CVE-2022-48861] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7895] = "fixed-version: Fixed from version 4.11"
+CVE_STATUS[CVE-2022-48862] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-7979] = "fixed-version: Fixed from version 4.11rc8"
+CVE_STATUS[CVE-2022-48863] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-8061] = "fixed-version: Fixed from version 4.11rc4"
+CVE_STATUS[CVE-2022-48864] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-8062] = "fixed-version: Fixed from version 4.11rc2"
+CVE_STATUS[CVE-2022-48865] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-8063] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48866] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2017-8064] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48867] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8065] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48868] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8066] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48869] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8067] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48870] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8068] = "fixed-version: Fixed from version 4.10rc8"
+CVE_STATUS[CVE-2022-48871] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8069] = "fixed-version: Fixed from version 4.10rc8"
+CVE_STATUS[CVE-2022-48872] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8070] = "fixed-version: Fixed from version 4.10rc8"
+CVE_STATUS[CVE-2022-48873] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8071] = "fixed-version: Fixed from version 4.10rc7"
+CVE_STATUS[CVE-2022-48874] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8072] = "fixed-version: Fixed from version 4.10rc7"
+CVE_STATUS[CVE-2022-48875] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8106] = "fixed-version: Fixed from version 3.16rc1"
+CVE_STATUS[CVE-2022-48876] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8240] = "fixed-version: Fixed from version 3.19rc6"
+CVE_STATUS[CVE-2022-48877] = "fixed-version: Fixed from version 6.2"
-# CVE-2017-8242 has no known resolution
+CVE_STATUS[CVE-2022-48878] = "fixed-version: Fixed from version 6.2"
-# CVE-2017-8244 has no known resolution
+CVE_STATUS[CVE-2022-48879] = "fixed-version: Fixed from version 6.2"
-# CVE-2017-8245 has no known resolution
+CVE_STATUS[CVE-2022-48880] = "fixed-version: Fixed from version 6.2"
-# CVE-2017-8246 has no known resolution
+CVE_STATUS[CVE-2022-48881] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8797] = "fixed-version: Fixed from version 4.12rc1"
+CVE_STATUS[CVE-2022-48882] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8824] = "fixed-version: Fixed from version 4.15rc3"
+CVE_STATUS[CVE-2022-48883] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8831] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48884] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8890] = "fixed-version: Fixed from version 4.12rc1"
+CVE_STATUS[CVE-2022-48885] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8924] = "fixed-version: Fixed from version 4.11rc2"
+CVE_STATUS[CVE-2022-48886] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-8925] = "fixed-version: Fixed from version 4.11rc2"
+CVE_STATUS[CVE-2022-48887] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-9059] = "fixed-version: Fixed from version 4.12rc1"
+CVE_STATUS[CVE-2022-48888] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-9074] = "fixed-version: Fixed from version 4.12rc2"
+CVE_STATUS[CVE-2022-48889] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-9075] = "fixed-version: Fixed from version 4.12rc2"
+CVE_STATUS[CVE-2022-48890] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-9076] = "fixed-version: Fixed from version 4.12rc2"
+CVE_STATUS[CVE-2022-48891] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-9077] = "fixed-version: Fixed from version 4.12rc2"
+CVE_STATUS[CVE-2022-48892] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-9150] = "fixed-version: Fixed from version 4.12rc1"
+CVE_STATUS[CVE-2022-48893] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-9211] = "fixed-version: Fixed from version 4.12rc3"
+CVE_STATUS[CVE-2022-48894] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-9242] = "fixed-version: Fixed from version 4.12rc3"
+CVE_STATUS[CVE-2022-48895] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-9605] = "fixed-version: Fixed from version 4.12rc5"
+CVE_STATUS[CVE-2022-48896] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-9725] = "fixed-version: Fixed from version 4.3rc7"
+CVE_STATUS[CVE-2022-48897] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-9984] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48898] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-9985] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48899] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2017-9986] = "fixed-version: Fixed from version 4.15rc1"
+CVE_STATUS[CVE-2022-48901] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1000004] = "fixed-version: Fixed from version 4.15rc9"
+CVE_STATUS[CVE-2022-48902] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1000026] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-48903] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1000028] = "fixed-version: Fixed from version 4.15"
+CVE_STATUS[CVE-2022-48904] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1000199] = "fixed-version: Fixed from version 4.16"
+CVE_STATUS[CVE-2022-48905] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1000200] = "fixed-version: Fixed from version 4.17rc5"
+CVE_STATUS[CVE-2022-48906] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1000204] = "fixed-version: Fixed from version 4.17rc7"
+CVE_STATUS[CVE-2022-48907] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10021] = "fixed-version: Fixed from version 4.16rc7"
+CVE_STATUS[CVE-2022-48908] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10074] = "fixed-version: Fixed from version 4.16rc7"
+CVE_STATUS[CVE-2022-48909] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10087] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48910] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10124] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48911] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10322] = "fixed-version: Fixed from version 4.17rc4"
+CVE_STATUS[CVE-2022-48912] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10323] = "fixed-version: Fixed from version 4.17rc4"
+CVE_STATUS[CVE-2022-48913] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1065] = "fixed-version: Fixed from version 4.16rc3"
+CVE_STATUS[CVE-2022-48914] = "fixed-version: Fixed from version 5.16.13"
-CVE_STATUS[CVE-2018-1066] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48915] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10675] = "fixed-version: Fixed from version 4.13rc6"
+CVE_STATUS[CVE-2022-48916] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1068] = "fixed-version: Fixed from version 4.16rc5"
+CVE_STATUS[CVE-2022-48918] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10840] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-48919] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10853] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-48920] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1087] = "fixed-version: Fixed from version 4.16rc7"
+CVE_STATUS[CVE-2022-48921] = "fixed-version: Fixed from version 5.17"
-# CVE-2018-10872 has no known resolution
+CVE_STATUS[CVE-2022-48922] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10876] = "fixed-version: Fixed from version 4.18rc4"
+CVE_STATUS[CVE-2022-48923] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10877] = "fixed-version: Fixed from version 4.18rc4"
+CVE_STATUS[CVE-2022-48924] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10878] = "fixed-version: Fixed from version 4.18rc4"
+CVE_STATUS[CVE-2022-48925] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10879] = "fixed-version: Fixed from version 4.18rc4"
+CVE_STATUS[CVE-2022-48926] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10880] = "fixed-version: Fixed from version 4.18rc4"
+CVE_STATUS[CVE-2022-48927] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10881] = "fixed-version: Fixed from version 4.18rc4"
+CVE_STATUS[CVE-2022-48928] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10882] = "fixed-version: Fixed from version 4.18rc4"
+CVE_STATUS[CVE-2022-48929] = "fixed-version: Fixed from version 5.16.12"
-CVE_STATUS[CVE-2018-10883] = "fixed-version: Fixed from version 4.18rc4"
+CVE_STATUS[CVE-2022-48930] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10901] = "fixed-version: Fixed from version 2.6.36rc1"
+CVE_STATUS[CVE-2022-48931] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10902] = "fixed-version: Fixed from version 4.18rc6"
+CVE_STATUS[CVE-2022-48932] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1091] = "fixed-version: Fixed from version 4.14rc2"
+CVE_STATUS[CVE-2022-48933] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1092] = "fixed-version: Fixed from version 4.17rc1"
+CVE_STATUS[CVE-2022-48934] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1093] = "fixed-version: Fixed from version 4.17rc1"
+CVE_STATUS[CVE-2022-48935] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10938] = "fixed-version: Fixed from version 4.13rc5"
+CVE_STATUS[CVE-2022-48937] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1094] = "fixed-version: Fixed from version 4.17rc1"
+CVE_STATUS[CVE-2022-48938] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-10940] = "fixed-version: Fixed from version 4.17rc3"
+CVE_STATUS[CVE-2022-48939] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1095] = "fixed-version: Fixed from version 4.17rc1"
+CVE_STATUS[CVE-2022-48940] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1108] = "fixed-version: Fixed from version 4.17rc2"
+CVE_STATUS[CVE-2022-48941] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1118] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-48942] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-1120] = "fixed-version: Fixed from version 4.17rc6"
+CVE_STATUS[CVE-2022-48943] = "fixed-version: Fixed from version 5.17"
-# CVE-2018-1121 has no known resolution
+CVE_STATUS[CVE-2022-48944] = "fixed-version: Fixed from version 5.17"
-CVE_STATUS[CVE-2018-11232] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-48945] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2018-1128] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48946] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2018-1129] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48947] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-1130] = "fixed-version: Fixed from version 4.16rc7"
+CVE_STATUS[CVE-2022-48948] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2018-11412] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-48949] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2018-11506] = "fixed-version: Fixed from version 4.17rc7"
+CVE_STATUS[CVE-2022-48950] = "fixed-version: Fixed from version 6.0.14"
-CVE_STATUS[CVE-2018-11508] = "fixed-version: Fixed from version 4.17rc5"
+CVE_STATUS[CVE-2022-48951] = "fixed-version: Fixed from version 6.1"
-# CVE-2018-11987 has no known resolution
+CVE_STATUS[CVE-2022-48952] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2018-12126] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-48953] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-12127] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-48954] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-12130] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-48955] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-12207] = "fixed-version: Fixed from version 5.4rc2"
+CVE_STATUS[CVE-2022-48956] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-12232] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-48957] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-12233] = "fixed-version: Fixed from version 4.18rc2"
+CVE_STATUS[CVE-2022-48958] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-12633] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-48959] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-12714] = "fixed-version: Fixed from version 4.18rc2"
+CVE_STATUS[CVE-2022-48960] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-12896] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48961] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-12904] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-48962] = "fixed-version: Fixed from version 6.1"
-# CVE-2018-12928 has no known resolution
+CVE_STATUS[CVE-2022-48963] = "fixed-version: Fixed from version 6.1"
-# CVE-2018-12929 has no known resolution
+CVE_STATUS[CVE-2022-48964] = "fixed-version: Fixed from version 6.1"
-# CVE-2018-12930 has no known resolution
+CVE_STATUS[CVE-2022-48965] = "fixed-version: Fixed from version 6.1"
-# CVE-2018-12931 has no known resolution
+CVE_STATUS[CVE-2022-48966] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-13053] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48967] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-13093] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-48968] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-13094] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-48969] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-13095] = "fixed-version: Fixed from version 4.18rc3"
+CVE_STATUS[CVE-2022-48970] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-13096] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48971] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-13097] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48972] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-13098] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48973] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-13099] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48974] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-13100] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48975] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-13405] = "fixed-version: Fixed from version 4.18rc4"
+CVE_STATUS[CVE-2022-48976] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-13406] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-48977] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14609] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48978] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14610] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48979] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14611] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48980] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14612] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48981] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14613] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48982] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14614] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48983] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14615] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48984] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14616] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48985] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14617] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48986] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14619] = "fixed-version: Fixed from version 4.15rc4"
+CVE_STATUS[CVE-2022-48987] = "fixed-version: Fixed from version 6.0.13"
-CVE_STATUS[CVE-2018-14625] = "fixed-version: Fixed from version 4.20rc6"
+CVE_STATUS[CVE-2022-48988] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14633] = "fixed-version: Fixed from version 4.19rc6"
+CVE_STATUS[CVE-2022-48989] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14634] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-48990] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14641] = "fixed-version: Fixed from version 4.19rc4"
+CVE_STATUS[CVE-2022-48991] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14646] = "fixed-version: Fixed from version 4.15rc8"
+CVE_STATUS[CVE-2022-48992] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14656] = "fixed-version: Fixed from version 4.19rc2"
+CVE_STATUS[CVE-2022-48994] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14678] = "fixed-version: Fixed from version 4.18rc8"
+CVE_STATUS[CVE-2022-48995] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-14734] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-48996] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-15471] = "fixed-version: Fixed from version 4.19rc7"
+CVE_STATUS[CVE-2022-48997] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-15572] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48998] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-15594] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-48999] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-16276] = "fixed-version: Fixed from version 4.18rc5"
+CVE_STATUS[CVE-2022-49000] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-16597] = "fixed-version: Fixed from version 4.8rc1"
+CVE_STATUS[CVE-2022-49001] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-16658] = "fixed-version: Fixed from version 4.19rc2"
+CVE_STATUS[CVE-2022-49002] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-16862] = "fixed-version: Fixed from version 4.20rc5"
+CVE_STATUS[CVE-2022-49003] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-16871] = "fixed-version: Fixed from version 4.20rc3"
+CVE_STATUS[CVE-2022-49004] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-16880] = "fixed-version: Fixed from version 5.0rc5"
+CVE_STATUS[CVE-2022-49005] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-16882] = "fixed-version: Fixed from version 4.20"
+CVE_STATUS[CVE-2022-49006] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-16884] = "fixed-version: Fixed from version 5.0rc1"
+CVE_STATUS[CVE-2022-49007] = "fixed-version: Fixed from version 6.1"
-# CVE-2018-16885 has no known resolution
+CVE_STATUS[CVE-2022-49008] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-17182] = "fixed-version: Fixed from version 4.19rc4"
+CVE_STATUS[CVE-2022-49009] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-17972] = "fixed-version: Fixed from version 4.19rc7"
+CVE_STATUS[CVE-2022-49010] = "fixed-version: Fixed from version 6.1"
-# CVE-2018-17977 has no known resolution
+CVE_STATUS[CVE-2022-49011] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-18021] = "fixed-version: Fixed from version 4.19rc7"
+CVE_STATUS[CVE-2022-49012] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-18281] = "fixed-version: Fixed from version 4.19"
+CVE_STATUS[CVE-2022-49013] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-18386] = "fixed-version: Fixed from version 4.15rc6"
+CVE_STATUS[CVE-2022-49014] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-18397] = "fixed-version: Fixed from version 4.20rc5"
+CVE_STATUS[CVE-2022-49015] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-18445] = "fixed-version: Fixed from version 4.19rc7"
+CVE_STATUS[CVE-2022-49016] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-18559] = "fixed-version: Fixed from version 4.15rc2"
+CVE_STATUS[CVE-2022-49017] = "fixed-version: Fixed from version 6.1"
-# CVE-2018-18653 has no known resolution
+CVE_STATUS[CVE-2022-49018] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-18690] = "fixed-version: Fixed from version 4.17rc4"
+CVE_STATUS[CVE-2022-49019] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-18710] = "fixed-version: Fixed from version 4.20rc1"
+CVE_STATUS[CVE-2022-49020] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-18955] = "fixed-version: Fixed from version 4.20rc2"
+CVE_STATUS[CVE-2022-49021] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-19406] = "fixed-version: Fixed from version 4.20rc5"
+CVE_STATUS[CVE-2022-49022] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-19407] = "fixed-version: Fixed from version 4.20rc5"
+CVE_STATUS[CVE-2022-49023] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-19824] = "fixed-version: Fixed from version 4.20rc6"
+CVE_STATUS[CVE-2022-49024] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-19854] = "fixed-version: Fixed from version 4.20rc3"
+CVE_STATUS[CVE-2022-49025] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-19985] = "fixed-version: Fixed from version 4.20"
+CVE_STATUS[CVE-2022-49026] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-20169] = "fixed-version: Fixed from version 4.20rc6"
+CVE_STATUS[CVE-2022-49027] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-20449] = "fixed-version: Fixed from version 4.15rc2"
+CVE_STATUS[CVE-2022-49028] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-20509] = "fixed-version: Fixed from version 4.14rc1"
+CVE_STATUS[CVE-2022-49029] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-20510] = "fixed-version: Fixed from version 4.16rc3"
+CVE_STATUS[CVE-2022-49030] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-20511] = "fixed-version: Fixed from version 4.19rc5"
+CVE_STATUS[CVE-2022-49031] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-20669] = "fixed-version: Fixed from version 5.0rc1"
+CVE_STATUS[CVE-2022-49032] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-20784] = "fixed-version: Fixed from version 5.0rc1"
+CVE_STATUS[CVE-2022-49033] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-20836] = "fixed-version: Fixed from version 4.20rc1"
+CVE_STATUS[CVE-2022-49034] = "cpe-stable-backport: Backported in 6.6.64"
-CVE_STATUS[CVE-2018-20854] = "fixed-version: Fixed from version 4.20rc1"
+CVE_STATUS[CVE-2022-49035] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2018-20855] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-49044] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-20856] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-49046] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-20961] = "fixed-version: Fixed from version 4.17rc1"
+CVE_STATUS[CVE-2022-49047] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-20976] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-49048] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-21008] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-49049] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-25015] = "fixed-version: Fixed from version 4.15rc9"
+CVE_STATUS[CVE-2022-49050] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-25020] = "fixed-version: Fixed from version 4.17rc7"
+CVE_STATUS[CVE-2022-49051] = "fixed-version: Fixed from version 5.18"
-# CVE-2018-3574 has no known resolution
+CVE_STATUS[CVE-2022-49052] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-3620] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-49053] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-3639] = "fixed-version: Fixed from version 4.17rc7"
+CVE_STATUS[CVE-2022-49054] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-3646] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-49055] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-3665] = "fixed-version: Fixed from version 3.7rc1"
+CVE_STATUS[CVE-2022-49057] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-3693] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-49058] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-5332] = "fixed-version: Fixed from version 4.15rc8"
+CVE_STATUS[CVE-2022-49059] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-5333] = "fixed-version: Fixed from version 4.15rc8"
+CVE_STATUS[CVE-2022-49060] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-5344] = "fixed-version: Fixed from version 4.15rc8"
+CVE_STATUS[CVE-2022-49061] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-5390] = "fixed-version: Fixed from version 4.18rc7"
+CVE_STATUS[CVE-2022-49062] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-5391] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-49063] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-5703] = "fixed-version: Fixed from version 4.16rc5"
+CVE_STATUS[CVE-2022-49064] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-5750] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-49065] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-5803] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-49066] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-5814] = "fixed-version: Fixed from version 4.17rc6"
+CVE_STATUS[CVE-2022-49067] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-5848] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-49068] = "fixed-version: Fixed from version 5.18"
-# Skipping CVE-2018-5856, no affected_versions
+CVE_STATUS[CVE-2022-49069] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-5873] = "fixed-version: Fixed from version 4.11rc8"
+CVE_STATUS[CVE-2022-49070] = "fixed-version: Fixed from version 5.17.3"
-CVE_STATUS[CVE-2018-5953] = "fixed-version: Fixed from version 4.15rc2"
+CVE_STATUS[CVE-2022-49071] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-5995] = "fixed-version: Fixed from version 4.15rc2"
+CVE_STATUS[CVE-2022-49072] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-6412] = "fixed-version: Fixed from version 4.16rc5"
+CVE_STATUS[CVE-2022-49073] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-6554] = "fixed-version: Fixed from version 4.17rc1"
+CVE_STATUS[CVE-2022-49074] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-6555] = "fixed-version: Fixed from version 4.17rc1"
+CVE_STATUS[CVE-2022-49075] = "fixed-version: Fixed from version 5.18"
-# CVE-2018-6559 has no known resolution
+CVE_STATUS[CVE-2022-49076] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-6927] = "fixed-version: Fixed from version 4.15rc9"
+CVE_STATUS[CVE-2022-49077] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-7191] = "fixed-version: Fixed from version 4.14rc6"
+CVE_STATUS[CVE-2022-49078] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-7273] = "fixed-version: Fixed from version 4.15rc2"
+CVE_STATUS[CVE-2022-49079] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-7480] = "fixed-version: Fixed from version 4.11rc1"
+CVE_STATUS[CVE-2022-49080] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-7492] = "fixed-version: Fixed from version 4.15rc3"
+CVE_STATUS[CVE-2022-49081] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-7566] = "fixed-version: Fixed from version 4.16rc2"
+CVE_STATUS[CVE-2022-49082] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-7740] = "fixed-version: Fixed from version 4.16rc7"
+CVE_STATUS[CVE-2022-49083] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-7754] = "fixed-version: Fixed from version 4.15rc2"
+CVE_STATUS[CVE-2022-49084] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-7755] = "fixed-version: Fixed from version 4.19rc5"
+CVE_STATUS[CVE-2022-49085] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-7757] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-49086] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-7995] = "fixed-version: Fixed from version 4.16rc5"
+CVE_STATUS[CVE-2022-49087] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-8043] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-49088] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-8087] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-49089] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-8781] = "fixed-version: Fixed from version 4.16rc7"
+CVE_STATUS[CVE-2022-49090] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-8822] = "fixed-version: Fixed from version 4.16rc7"
+CVE_STATUS[CVE-2022-49091] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-8897] = "fixed-version: Fixed from version 4.16rc7"
+CVE_STATUS[CVE-2022-49092] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-9363] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-49093] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-9385] = "fixed-version: Fixed from version 4.17rc3"
+CVE_STATUS[CVE-2022-49094] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-9415] = "fixed-version: Fixed from version 4.17rc3"
+CVE_STATUS[CVE-2022-49095] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-9422] = "fixed-version: Fixed from version 4.6rc1"
+CVE_STATUS[CVE-2022-49096] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-9465] = "fixed-version: Fixed from version 4.15rc6"
+CVE_STATUS[CVE-2022-49097] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-9516] = "fixed-version: Fixed from version 4.18rc5"
+CVE_STATUS[CVE-2022-49098] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-9517] = "fixed-version: Fixed from version 4.14rc1"
+CVE_STATUS[CVE-2022-49099] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-9518] = "fixed-version: Fixed from version 4.16rc3"
+CVE_STATUS[CVE-2022-49100] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2018-9568] = "fixed-version: Fixed from version 4.14rc4"
+CVE_STATUS[CVE-2022-49102] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-0136] = "fixed-version: Fixed from version 5.2rc6"
+CVE_STATUS[CVE-2022-49103] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-0145] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49104] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-0146] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49105] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-0147] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49106] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-0148] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49107] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-0149] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49108] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-0154] = "fixed-version: Fixed from version 5.4rc8"
+CVE_STATUS[CVE-2022-49109] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-0155] = "fixed-version: Fixed from version 5.4rc8"
+CVE_STATUS[CVE-2022-49110] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-10124] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49111] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-10125] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49112] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-10126] = "fixed-version: Fixed from version 5.2rc6"
+CVE_STATUS[CVE-2022-49113] = "fixed-version: Fixed from version 5.18"
-# CVE-2019-10140 has no known resolution
+CVE_STATUS[CVE-2022-49114] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-10142] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49115] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-10207] = "fixed-version: Fixed from version 5.3rc3"
+CVE_STATUS[CVE-2022-49116] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-10220] = "fixed-version: Fixed from version 5.4rc2"
+CVE_STATUS[CVE-2022-49117] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-10638] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49118] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-10639] = "fixed-version: Fixed from version 5.1rc4"
+CVE_STATUS[CVE-2022-49119] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11085] = "fixed-version: Fixed from version 5.0rc3"
+CVE_STATUS[CVE-2022-49120] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11091] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49121] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11135] = "fixed-version: Fixed from version 5.4rc8"
+CVE_STATUS[CVE-2022-49122] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11190] = "fixed-version: Fixed from version 4.8rc5"
+CVE_STATUS[CVE-2022-49123] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11191] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49124] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-1125] = "fixed-version: Fixed from version 5.3rc4"
+CVE_STATUS[CVE-2022-49125] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11477] = "fixed-version: Fixed from version 5.2rc6"
+CVE_STATUS[CVE-2022-49126] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11478] = "fixed-version: Fixed from version 5.2rc6"
+CVE_STATUS[CVE-2022-49127] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11479] = "fixed-version: Fixed from version 5.2rc6"
+CVE_STATUS[CVE-2022-49128] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11486] = "fixed-version: Fixed from version 5.1rc4"
+CVE_STATUS[CVE-2022-49129] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11487] = "fixed-version: Fixed from version 5.1rc5"
+CVE_STATUS[CVE-2022-49130] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11599] = "fixed-version: Fixed from version 5.1rc6"
+CVE_STATUS[CVE-2022-49131] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11683] = "fixed-version: Fixed from version 5.1"
+CVE_STATUS[CVE-2022-49132] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11810] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49133] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11811] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49134] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11815] = "fixed-version: Fixed from version 5.1rc4"
+CVE_STATUS[CVE-2022-49135] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11833] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49136] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-11884] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49137] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12378] = "fixed-version: Fixed from version 5.2rc3"
+CVE_STATUS[CVE-2022-49138] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12379] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49139] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12380] = "fixed-version: Fixed from version 5.2rc3"
+CVE_STATUS[CVE-2022-49141] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12381] = "fixed-version: Fixed from version 5.2rc3"
+CVE_STATUS[CVE-2022-49142] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12382] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49144] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12454] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49145] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12455] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49146] = "fixed-version: Fixed from version 5.18"
-# CVE-2019-12456 has no known resolution
+CVE_STATUS[CVE-2022-49147] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12614] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49148] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12615] = "fixed-version: Fixed from version 5.2rc4"
+CVE_STATUS[CVE-2022-49149] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12817] = "fixed-version: Fixed from version 5.2rc7"
+CVE_STATUS[CVE-2022-49150] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12818] = "fixed-version: Fixed from version 5.0"
+CVE_STATUS[CVE-2022-49151] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12819] = "fixed-version: Fixed from version 5.0rc8"
+CVE_STATUS[CVE-2022-49152] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12881] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-49153] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-12984] = "fixed-version: Fixed from version 5.2rc6"
+CVE_STATUS[CVE-2022-49154] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-13233] = "fixed-version: Fixed from version 5.2rc4"
+CVE_STATUS[CVE-2022-49155] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-13272] = "fixed-version: Fixed from version 5.2"
+CVE_STATUS[CVE-2022-49156] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-13631] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49157] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-13648] = "fixed-version: Fixed from version 5.3rc2"
+CVE_STATUS[CVE-2022-49158] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-14283] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49159] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-14284] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49160] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-14615] = "fixed-version: Fixed from version 5.5rc7"
+CVE_STATUS[CVE-2022-49161] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-14763] = "fixed-version: Fixed from version 4.17rc1"
+CVE_STATUS[CVE-2022-49162] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-14814] = "fixed-version: Fixed from version 5.3"
+CVE_STATUS[CVE-2022-49163] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-14815] = "fixed-version: Fixed from version 5.3"
+CVE_STATUS[CVE-2022-49164] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-14816] = "fixed-version: Fixed from version 5.3"
+CVE_STATUS[CVE-2022-49165] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-14821] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49166] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-14835] = "fixed-version: Fixed from version 5.3"
+CVE_STATUS[CVE-2022-49167] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-14895] = "fixed-version: Fixed from version 5.5rc3"
+CVE_STATUS[CVE-2022-49168] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-14896] = "fixed-version: Fixed from version 5.5"
+CVE_STATUS[CVE-2022-49169] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-14897] = "fixed-version: Fixed from version 5.5"
+CVE_STATUS[CVE-2022-49170] = "fixed-version: Fixed from version 5.18"
-# CVE-2019-14898 has no known resolution
+CVE_STATUS[CVE-2022-49171] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-14901] = "fixed-version: Fixed from version 5.5rc3"
+CVE_STATUS[CVE-2022-49172] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15030] = "fixed-version: Fixed from version 5.3rc8"
+CVE_STATUS[CVE-2022-49173] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15031] = "fixed-version: Fixed from version 5.3rc8"
+CVE_STATUS[CVE-2022-49174] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15090] = "fixed-version: Fixed from version 5.2rc2"
+CVE_STATUS[CVE-2022-49175] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15098] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49176] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15099] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49177] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15117] = "fixed-version: Fixed from version 5.3rc5"
+CVE_STATUS[CVE-2022-49178] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15118] = "fixed-version: Fixed from version 5.3rc5"
+CVE_STATUS[CVE-2022-49179] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15211] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49180] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15212] = "fixed-version: Fixed from version 5.2rc3"
+CVE_STATUS[CVE-2022-49182] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15213] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49183] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15214] = "fixed-version: Fixed from version 5.1rc6"
+CVE_STATUS[CVE-2022-49184] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15215] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49185] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15216] = "fixed-version: Fixed from version 5.1"
+CVE_STATUS[CVE-2022-49186] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15217] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49187] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15218] = "fixed-version: Fixed from version 5.2rc3"
+CVE_STATUS[CVE-2022-49188] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15219] = "fixed-version: Fixed from version 5.2rc3"
+CVE_STATUS[CVE-2022-49189] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15220] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49190] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15221] = "fixed-version: Fixed from version 5.2"
+CVE_STATUS[CVE-2022-49191] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15222] = "fixed-version: Fixed from version 5.3rc3"
+CVE_STATUS[CVE-2022-49192] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15223] = "fixed-version: Fixed from version 5.2rc3"
+CVE_STATUS[CVE-2022-49193] = "fixed-version: Fixed from version 5.18"
-# CVE-2019-15239 has no known resolution
+CVE_STATUS[CVE-2022-49194] = "fixed-version: Fixed from version 5.18"
-# CVE-2019-15290 has no known resolution
+CVE_STATUS[CVE-2022-49195] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15291] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49196] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15292] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49197] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15504] = "fixed-version: Fixed from version 5.3"
+CVE_STATUS[CVE-2022-49198] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15505] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49199] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15538] = "fixed-version: Fixed from version 5.3rc6"
+CVE_STATUS[CVE-2022-49200] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15666] = "fixed-version: Fixed from version 5.1"
+CVE_STATUS[CVE-2022-49201] = "fixed-version: Fixed from version 5.18"
-# CVE-2019-15791 has no known resolution
+CVE_STATUS[CVE-2022-49202] = "fixed-version: Fixed from version 5.18"
-# CVE-2019-15792 has no known resolution
+CVE_STATUS[CVE-2022-49203] = "fixed-version: Fixed from version 5.18"
-# CVE-2019-15793 has no known resolution
+CVE_STATUS[CVE-2022-49204] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15794] = "fixed-version: Fixed from version 5.12"
+CVE_STATUS[CVE-2022-49205] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15807] = "fixed-version: Fixed from version 5.2rc3"
+CVE_STATUS[CVE-2022-49206] = "fixed-version: Fixed from version 5.18"
-# CVE-2019-15902 has no known resolution
+CVE_STATUS[CVE-2022-49207] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15916] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49208] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15917] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49209] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15918] = "fixed-version: Fixed from version 5.1rc6"
+CVE_STATUS[CVE-2022-49210] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15919] = "fixed-version: Fixed from version 5.1rc6"
+CVE_STATUS[CVE-2022-49211] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15920] = "fixed-version: Fixed from version 5.1rc6"
+CVE_STATUS[CVE-2022-49212] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15921] = "fixed-version: Fixed from version 5.1rc3"
+CVE_STATUS[CVE-2022-49213] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15922] = "fixed-version: Fixed from version 5.1rc4"
+CVE_STATUS[CVE-2022-49214] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15923] = "fixed-version: Fixed from version 5.1rc4"
+CVE_STATUS[CVE-2022-49215] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15924] = "fixed-version: Fixed from version 5.1rc4"
+CVE_STATUS[CVE-2022-49216] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15925] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49217] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15926] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49218] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-15927] = "fixed-version: Fixed from version 5.0rc2"
+CVE_STATUS[CVE-2022-49219] = "fixed-version: Fixed from version 5.18"
-# CVE-2019-16089 has no known resolution
+CVE_STATUS[CVE-2022-49220] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-16229] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49221] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-16230] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49222] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-16231] = "fixed-version: Fixed from version 5.4rc6"
+CVE_STATUS[CVE-2022-49223] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-16232] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49224] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-16233] = "fixed-version: Fixed from version 5.4rc5"
+CVE_STATUS[CVE-2022-49225] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-16234] = "fixed-version: Fixed from version 5.4rc4"
+CVE_STATUS[CVE-2022-49226] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-16413] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49227] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-16714] = "fixed-version: Fixed from version 5.3rc7"
+CVE_STATUS[CVE-2022-49228] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-16746] = "fixed-version: Fixed from version 5.4rc2"
+CVE_STATUS[CVE-2022-49229] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-16921] = "fixed-version: Fixed from version 4.17rc1"
+CVE_STATUS[CVE-2022-49230] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-16994] = "fixed-version: Fixed from version 5.0"
+CVE_STATUS[CVE-2022-49231] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-16995] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49232] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-17052] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49233] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-17053] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49234] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-17054] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49235] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-17055] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49236] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-17056] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49237] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-17075] = "fixed-version: Fixed from version 5.4rc3"
+CVE_STATUS[CVE-2022-49238] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-17133] = "fixed-version: Fixed from version 5.4rc4"
+CVE_STATUS[CVE-2022-49239] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-17351] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49240] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-17666] = "fixed-version: Fixed from version 5.4rc6"
+CVE_STATUS[CVE-2022-49241] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18198] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49242] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18282] = "fixed-version: Fixed from version 5.4rc6"
+CVE_STATUS[CVE-2022-49243] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18660] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49244] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18675] = "fixed-version: Fixed from version 4.17rc5"
+CVE_STATUS[CVE-2022-49245] = "fixed-version: Fixed from version 5.18"
-# CVE-2019-18680 has no known resolution
+CVE_STATUS[CVE-2022-49246] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18683] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49247] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18786] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49248] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18805] = "fixed-version: Fixed from version 5.1rc7"
+CVE_STATUS[CVE-2022-49249] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18806] = "fixed-version: Fixed from version 5.4rc2"
+CVE_STATUS[CVE-2022-49250] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18807] = "fixed-version: Fixed from version 5.4rc2"
+CVE_STATUS[CVE-2022-49251] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18808] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49252] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18809] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49253] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18810] = "fixed-version: Fixed from version 5.4rc2"
+CVE_STATUS[CVE-2022-49254] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18811] = "fixed-version: Fixed from version 5.4rc7"
+CVE_STATUS[CVE-2022-49255] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18812] = "fixed-version: Fixed from version 5.4rc7"
+CVE_STATUS[CVE-2022-49256] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18813] = "fixed-version: Fixed from version 5.4rc6"
+CVE_STATUS[CVE-2022-49257] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18814] = "fixed-version: Fixed from version 5.7rc7"
+CVE_STATUS[CVE-2022-49258] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-18885] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49259] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19036] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49260] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19037] = "fixed-version: Fixed from version 5.5rc3"
+CVE_STATUS[CVE-2022-49261] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19039] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49262] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19043] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49263] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19044] = "fixed-version: Fixed from version 5.4rc6"
+CVE_STATUS[CVE-2022-49264] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19045] = "fixed-version: Fixed from version 5.4rc6"
+CVE_STATUS[CVE-2022-49265] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19046] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49266] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19047] = "fixed-version: Fixed from version 5.4rc6"
+CVE_STATUS[CVE-2022-49268] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19048] = "fixed-version: Fixed from version 5.4rc3"
+CVE_STATUS[CVE-2022-49269] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19049] = "fixed-version: Fixed from version 5.4rc5"
+CVE_STATUS[CVE-2022-49270] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19050] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49271] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19051] = "fixed-version: Fixed from version 5.4rc6"
+CVE_STATUS[CVE-2022-49272] = "fixed-version: Fixed from version 5.17.2"
-CVE_STATUS[CVE-2019-19052] = "fixed-version: Fixed from version 5.4rc7"
+CVE_STATUS[CVE-2022-49273] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19053] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49274] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19054] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49275] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19055] = "fixed-version: Fixed from version 5.4rc4"
+CVE_STATUS[CVE-2022-49276] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19056] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49277] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19057] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49278] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19058] = "fixed-version: Fixed from version 5.4rc4"
+CVE_STATUS[CVE-2022-49279] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19059] = "fixed-version: Fixed from version 5.4rc4"
+CVE_STATUS[CVE-2022-49280] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19060] = "fixed-version: Fixed from version 5.4rc3"
+CVE_STATUS[CVE-2022-49281] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19061] = "fixed-version: Fixed from version 5.4rc3"
+CVE_STATUS[CVE-2022-49282] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19062] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49283] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19063] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49284] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19064] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49285] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19065] = "fixed-version: Fixed from version 5.4rc3"
+CVE_STATUS[CVE-2022-49286] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19066] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49287] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19067] = "fixed-version: Fixed from version 5.4rc2"
+CVE_STATUS[CVE-2022-49288] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19068] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49289] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19069] = "fixed-version: Fixed from version 5.4rc3"
+CVE_STATUS[CVE-2022-49290] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19070] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49291] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19071] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49292] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19072] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49293] = "fixed-version: Fixed from version 5.18"
-CVE_STATUS[CVE-2019-19073] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49294] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19074] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49295] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19075] = "fixed-version: Fixed from version 5.4rc2"
+CVE_STATUS[CVE-2022-49296] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19076] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49297] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19077] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49298] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19078] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49300] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19079] = "fixed-version: Fixed from version 5.3"
+CVE_STATUS[CVE-2022-49301] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19080] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49302] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19081] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49303] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19082] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49304] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19083] = "fixed-version: Fixed from version 5.4rc2"
+CVE_STATUS[CVE-2022-49305] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19227] = "fixed-version: Fixed from version 5.1rc3"
+CVE_STATUS[CVE-2022-49306] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19241] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49307] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19252] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49308] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19318] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49309] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19319] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49310] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19332] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49311] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19338] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49312] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19377] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49313] = "fixed-version: Fixed from version 5.19"
-# CVE-2019-19378 has no known resolution
+CVE_STATUS[CVE-2022-49314] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19447] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49315] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19448] = "fixed-version: Fixed from version 5.9rc1"
+CVE_STATUS[CVE-2022-49316] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19449] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49317] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19462] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49318] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19523] = "fixed-version: Fixed from version 5.4rc3"
+CVE_STATUS[CVE-2022-49319] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19524] = "fixed-version: Fixed from version 5.4rc8"
+CVE_STATUS[CVE-2022-49320] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19525] = "fixed-version: Fixed from version 5.4rc2"
+CVE_STATUS[CVE-2022-49321] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19526] = "fixed-version: Fixed from version 5.4rc4"
+CVE_STATUS[CVE-2022-49322] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19527] = "fixed-version: Fixed from version 5.3rc4"
+CVE_STATUS[CVE-2022-49323] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19528] = "fixed-version: Fixed from version 5.4rc3"
+CVE_STATUS[CVE-2022-49324] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19529] = "fixed-version: Fixed from version 5.4rc7"
+CVE_STATUS[CVE-2022-49325] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19530] = "fixed-version: Fixed from version 5.3rc5"
+CVE_STATUS[CVE-2022-49326] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19531] = "fixed-version: Fixed from version 5.3rc4"
+CVE_STATUS[CVE-2022-49327] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19532] = "fixed-version: Fixed from version 5.4rc6"
+CVE_STATUS[CVE-2022-49328] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19533] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49329] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19534] = "fixed-version: Fixed from version 5.4rc7"
+CVE_STATUS[CVE-2022-49330] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19535] = "fixed-version: Fixed from version 5.3rc4"
+CVE_STATUS[CVE-2022-49331] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19536] = "fixed-version: Fixed from version 5.3rc4"
+CVE_STATUS[CVE-2022-49332] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19537] = "fixed-version: Fixed from version 5.3rc5"
+CVE_STATUS[CVE-2022-49333] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19543] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49334] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19602] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49335] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19767] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49336] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19768] = "fixed-version: Fixed from version 5.6rc4"
+CVE_STATUS[CVE-2022-49337] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19769] = "fixed-version: Fixed from version 5.6rc5"
+CVE_STATUS[CVE-2022-49338] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19770] = "fixed-version: Fixed from version 5.9rc1"
+CVE_STATUS[CVE-2022-49339] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19807] = "fixed-version: Fixed from version 5.4rc7"
+CVE_STATUS[CVE-2022-49340] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19813] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49341] = "fixed-version: Fixed from version 5.19"
-# CVE-2019-19814 has no known resolution
+CVE_STATUS[CVE-2022-49342] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19815] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49343] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19816] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49344] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19922] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49345] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19927] = "fixed-version: Fixed from version 5.1rc6"
+CVE_STATUS[CVE-2022-49346] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19947] = "fixed-version: Fixed from version 5.5rc3"
+CVE_STATUS[CVE-2022-49347] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19965] = "fixed-version: Fixed from version 5.5rc2"
+CVE_STATUS[CVE-2022-49348] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-19966] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49349] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-1999] = "fixed-version: Fixed from version 5.1rc3"
+CVE_STATUS[CVE-2022-49350] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-20054] = "fixed-version: Fixed from version 5.1rc3"
+CVE_STATUS[CVE-2022-49351] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-20095] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49352] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-20096] = "fixed-version: Fixed from version 5.1rc4"
+CVE_STATUS[CVE-2022-49353] = "fixed-version: Fixed from version 5.18.4"
-CVE_STATUS[CVE-2019-2024] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-49354] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-2025] = "fixed-version: Fixed from version 4.20rc5"
+CVE_STATUS[CVE-2022-49356] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-20422] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49357] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-2054] = "fixed-version: Fixed from version 4.8rc1"
+CVE_STATUS[CVE-2022-49358] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-20636] = "fixed-version: Fixed from version 5.5rc6"
+CVE_STATUS[CVE-2022-49359] = "fixed-version: Fixed from version 5.19"
-# CVE-2019-20794 has no known resolution
+CVE_STATUS[CVE-2022-49360] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-20806] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49361] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-20810] = "fixed-version: Fixed from version 5.6rc1"
+CVE_STATUS[CVE-2022-49362] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-20811] = "fixed-version: Fixed from version 5.1rc3"
+CVE_STATUS[CVE-2022-49363] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-20812] = "fixed-version: Fixed from version 5.5rc3"
+CVE_STATUS[CVE-2022-49364] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-20908] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49365] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-20934] = "fixed-version: Fixed from version 5.3rc2"
+CVE_STATUS[CVE-2022-49366] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-2101] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49367] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-2181] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49368] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-2182] = "fixed-version: Fixed from version 4.16rc3"
+CVE_STATUS[CVE-2022-49369] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-2213] = "fixed-version: Fixed from version 5.2rc6"
+CVE_STATUS[CVE-2022-49370] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-2214] = "fixed-version: Fixed from version 5.3rc2"
+CVE_STATUS[CVE-2022-49371] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-2215] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-49372] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-25044] = "fixed-version: Fixed from version 5.2rc4"
+CVE_STATUS[CVE-2022-49373] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-25045] = "fixed-version: Fixed from version 5.1"
+CVE_STATUS[CVE-2022-49374] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-25160] = "fixed-version: Fixed from version 5.0"
+CVE_STATUS[CVE-2022-49375] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-25162] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-49376] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3016] = "fixed-version: Fixed from version 5.6rc1"
+CVE_STATUS[CVE-2022-49377] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3459] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49378] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3460] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49379] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3701] = "fixed-version: Fixed from version 5.0rc3"
+CVE_STATUS[CVE-2022-49380] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3819] = "fixed-version: Fixed from version 5.0rc6"
+CVE_STATUS[CVE-2022-49381] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3837] = "fixed-version: Fixed from version 3.18rc1"
+CVE_STATUS[CVE-2022-49382] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3846] = "fixed-version: Fixed from version 5.2rc6"
+CVE_STATUS[CVE-2022-49383] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3874] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49384] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3882] = "fixed-version: Fixed from version 5.1rc4"
+CVE_STATUS[CVE-2022-49385] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3887] = "fixed-version: Fixed from version 5.1rc4"
+CVE_STATUS[CVE-2022-49386] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3892] = "fixed-version: Fixed from version 5.1rc6"
+CVE_STATUS[CVE-2022-49387] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3896] = "fixed-version: Fixed from version 2.6.35rc1"
+CVE_STATUS[CVE-2022-49388] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3900] = "fixed-version: Fixed from version 5.2rc4"
+CVE_STATUS[CVE-2022-49389] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-3901] = "fixed-version: Fixed from version 4.6rc6"
+CVE_STATUS[CVE-2022-49390] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-5108] = "fixed-version: Fixed from version 5.3"
+CVE_STATUS[CVE-2022-49391] = "fixed-version: Fixed from version 5.19"
-# Skipping CVE-2019-5489, no affected_versions
+CVE_STATUS[CVE-2022-49392] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-6133] = "fixed-version: Fixed from version 5.0rc2"
+CVE_STATUS[CVE-2022-49393] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-6974] = "fixed-version: Fixed from version 5.0rc6"
+CVE_STATUS[CVE-2022-49394] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-7221] = "fixed-version: Fixed from version 5.0rc6"
+CVE_STATUS[CVE-2022-49395] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-7222] = "fixed-version: Fixed from version 5.0rc6"
+CVE_STATUS[CVE-2022-49396] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-7308] = "fixed-version: Fixed from version 5.0rc3"
+CVE_STATUS[CVE-2022-49397] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-8912] = "fixed-version: Fixed from version 5.0rc8"
+CVE_STATUS[CVE-2022-49398] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-8956] = "fixed-version: Fixed from version 5.0rc6"
+CVE_STATUS[CVE-2022-49399] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-8980] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49400] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9003] = "fixed-version: Fixed from version 5.0rc4"
+CVE_STATUS[CVE-2022-49401] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9162] = "fixed-version: Fixed from version 5.0rc7"
+CVE_STATUS[CVE-2022-49402] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9213] = "fixed-version: Fixed from version 5.0"
+CVE_STATUS[CVE-2022-49403] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9245] = "fixed-version: Fixed from version 5.0rc1"
+CVE_STATUS[CVE-2022-49404] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9444] = "fixed-version: Fixed from version 4.15rc2"
+CVE_STATUS[CVE-2022-49405] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9445] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49406] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9453] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49407] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9454] = "fixed-version: Fixed from version 4.15rc9"
+CVE_STATUS[CVE-2022-49408] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9455] = "fixed-version: Fixed from version 5.0rc1"
+CVE_STATUS[CVE-2022-49409] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9456] = "fixed-version: Fixed from version 4.16rc6"
+CVE_STATUS[CVE-2022-49410] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9457] = "fixed-version: Fixed from version 4.13rc1"
+CVE_STATUS[CVE-2022-49411] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9458] = "fixed-version: Fixed from version 4.19rc7"
+CVE_STATUS[CVE-2022-49412] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9466] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49413] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9500] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49414] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9503] = "fixed-version: Fixed from version 5.1rc1"
+CVE_STATUS[CVE-2022-49415] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9506] = "fixed-version: Fixed from version 5.2"
+CVE_STATUS[CVE-2022-49416] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2019-9857] = "fixed-version: Fixed from version 5.1rc2"
+CVE_STATUS[CVE-2022-49417] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0009] = "fixed-version: Fixed from version 5.6rc3"
+CVE_STATUS[CVE-2022-49418] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0030] = "fixed-version: Fixed from version 4.16rc3"
+CVE_STATUS[CVE-2022-49419] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0041] = "fixed-version: Fixed from version 5.5rc2"
+CVE_STATUS[CVE-2022-49420] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0066] = "fixed-version: Fixed from version 4.3rc7"
+CVE_STATUS[CVE-2022-49421] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0067] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49422] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0110] = "fixed-version: Fixed from version 5.6rc2"
+CVE_STATUS[CVE-2022-49423] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0255] = "fixed-version: Fixed from version 5.7rc4"
+CVE_STATUS[CVE-2022-49424] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0305] = "fixed-version: Fixed from version 5.5rc6"
+CVE_STATUS[CVE-2022-49425] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-0347 has no known resolution
+CVE_STATUS[CVE-2022-49426] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0404] = "fixed-version: Fixed from version 5.6rc1"
+CVE_STATUS[CVE-2022-49427] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0423] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49428] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0427] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49429] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0429] = "fixed-version: Fixed from version 4.14rc4"
+CVE_STATUS[CVE-2022-49430] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0430] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-49431] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0431] = "fixed-version: Fixed from version 5.5rc6"
+CVE_STATUS[CVE-2022-49432] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0432] = "fixed-version: Fixed from version 5.6rc1"
+CVE_STATUS[CVE-2022-49433] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0433] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-49434] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0435] = "fixed-version: Fixed from version 4.19rc1"
+CVE_STATUS[CVE-2022-49435] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0444] = "fixed-version: Fixed from version 5.6rc4"
+CVE_STATUS[CVE-2022-49436] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0465] = "fixed-version: Fixed from version 5.9rc4"
+CVE_STATUS[CVE-2022-49437] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0466] = "fixed-version: Fixed from version 5.9rc2"
+CVE_STATUS[CVE-2022-49438] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-0543] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49439] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10135] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49440] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10690] = "fixed-version: Fixed from version 5.5rc5"
+CVE_STATUS[CVE-2022-49441] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-10708 has no known resolution
+CVE_STATUS[CVE-2022-49442] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10711] = "fixed-version: Fixed from version 5.7rc6"
+CVE_STATUS[CVE-2022-49443] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10720] = "fixed-version: Fixed from version 5.2rc3"
+CVE_STATUS[CVE-2022-49444] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10732] = "fixed-version: Fixed from version 5.7"
+CVE_STATUS[CVE-2022-49445] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10742] = "fixed-version: Fixed from version 3.16rc1"
+CVE_STATUS[CVE-2022-49446] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10751] = "fixed-version: Fixed from version 5.7rc4"
+CVE_STATUS[CVE-2022-49447] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10757] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49448] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10766] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49449] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10767] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49450] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10768] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49451] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10769] = "fixed-version: Fixed from version 5.0rc3"
+CVE_STATUS[CVE-2022-49452] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10773] = "fixed-version: Fixed from version 5.4rc6"
+CVE_STATUS[CVE-2022-49453] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-10774 has no known resolution
+CVE_STATUS[CVE-2022-49454] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10781] = "fixed-version: Fixed from version 5.8rc6"
+CVE_STATUS[CVE-2022-49455] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-10942] = "fixed-version: Fixed from version 5.6rc4"
+CVE_STATUS[CVE-2022-49456] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-11494] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49457] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-11565] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49458] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-11608] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49459] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-11609] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49460] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-11668] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49461] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-11669] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49462] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-11725 has no known resolution
+CVE_STATUS[CVE-2022-49463] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-11884] = "fixed-version: Fixed from version 5.7rc4"
+CVE_STATUS[CVE-2022-49464] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-11935 has no known resolution
+CVE_STATUS[CVE-2022-49465] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12114] = "fixed-version: Fixed from version 5.3rc1"
+CVE_STATUS[CVE-2022-49466] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12351] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49467] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12352] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49468] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12362] = "fixed-version: Fixed from version 5.11rc1"
+CVE_STATUS[CVE-2022-49469] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12363] = "fixed-version: Fixed from version 5.11rc1"
+CVE_STATUS[CVE-2022-49470] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12364] = "fixed-version: Fixed from version 5.11rc1"
+CVE_STATUS[CVE-2022-49471] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12464] = "fixed-version: Fixed from version 5.7rc3"
+CVE_STATUS[CVE-2022-49472] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12465] = "fixed-version: Fixed from version 5.6rc6"
+CVE_STATUS[CVE-2022-49473] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12652] = "fixed-version: Fixed from version 5.5rc7"
+CVE_STATUS[CVE-2022-49474] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12653] = "fixed-version: Fixed from version 5.6rc1"
+CVE_STATUS[CVE-2022-49475] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12654] = "fixed-version: Fixed from version 5.6rc1"
+CVE_STATUS[CVE-2022-49476] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12655] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49477] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12656] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49478] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12657] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49479] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12659] = "fixed-version: Fixed from version 5.7rc2"
+CVE_STATUS[CVE-2022-49480] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12768] = "fixed-version: Fixed from version 5.6rc4"
+CVE_STATUS[CVE-2022-49481] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12769] = "fixed-version: Fixed from version 5.5rc6"
+CVE_STATUS[CVE-2022-49482] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12770] = "fixed-version: Fixed from version 5.7rc3"
+CVE_STATUS[CVE-2022-49483] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12771] = "fixed-version: Fixed from version 5.8rc2"
+CVE_STATUS[CVE-2022-49484] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12826] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49485] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12888] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49486] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-12912] = "fixed-version: Fixed from version 5.10rc4"
+CVE_STATUS[CVE-2022-49487] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-13143] = "fixed-version: Fixed from version 5.7rc6"
+CVE_STATUS[CVE-2022-49488] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-13974] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49489] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-14304 has no known resolution
+CVE_STATUS[CVE-2022-49490] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-14305] = "fixed-version: Fixed from version 4.12rc1"
+CVE_STATUS[CVE-2022-49491] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-14314] = "fixed-version: Fixed from version 5.9rc2"
+CVE_STATUS[CVE-2022-49492] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-14331] = "fixed-version: Fixed from version 5.9rc1"
+CVE_STATUS[CVE-2022-49493] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-14351] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49494] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-14353] = "fixed-version: Fixed from version 4.14rc3"
+CVE_STATUS[CVE-2022-49495] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-14356] = "fixed-version: Fixed from version 5.8rc5"
+CVE_STATUS[CVE-2022-49496] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-14381] = "fixed-version: Fixed from version 5.6rc6"
+CVE_STATUS[CVE-2022-49497] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-14385] = "fixed-version: Fixed from version 5.9rc4"
+CVE_STATUS[CVE-2022-49498] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-14386] = "fixed-version: Fixed from version 5.9rc4"
+CVE_STATUS[CVE-2022-49499] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-14390] = "fixed-version: Fixed from version 5.9rc6"
+CVE_STATUS[CVE-2022-49500] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-14416] = "fixed-version: Fixed from version 5.5"
+CVE_STATUS[CVE-2022-49501] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-15393] = "fixed-version: Fixed from version 5.8rc3"
+CVE_STATUS[CVE-2022-49502] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-15436] = "fixed-version: Fixed from version 5.8rc2"
+CVE_STATUS[CVE-2022-49503] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-15437] = "fixed-version: Fixed from version 5.8rc7"
+CVE_STATUS[CVE-2022-49504] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-15780] = "fixed-version: Fixed from version 5.8rc3"
+CVE_STATUS[CVE-2022-49505] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-15802 has no known resolution
+CVE_STATUS[CVE-2022-49506] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-15852] = "fixed-version: Fixed from version 5.8rc6"
+CVE_STATUS[CVE-2022-49507] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-16119] = "fixed-version: Fixed from version 5.15rc2"
+CVE_STATUS[CVE-2022-49508] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-16120] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49509] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-16166] = "fixed-version: Fixed from version 5.8"
+CVE_STATUS[CVE-2022-49510] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-1749] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49511] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-24394] = "fixed-version: Fixed from version 5.8rc4"
+CVE_STATUS[CVE-2022-49512] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-24490] = "fixed-version: Fixed from version 5.8"
+CVE_STATUS[CVE-2022-49513] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-24502 has no known resolution
+CVE_STATUS[CVE-2022-49514] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-24503 has no known resolution
+CVE_STATUS[CVE-2022-49515] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-24504] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-49516] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-24586] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-49517] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-24587] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-49518] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-24588] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-49519] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25211] = "fixed-version: Fixed from version 5.9rc7"
+CVE_STATUS[CVE-2022-49520] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25212] = "fixed-version: Fixed from version 5.9rc1"
+CVE_STATUS[CVE-2022-49521] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-25220 has no known resolution
+CVE_STATUS[CVE-2022-49522] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25221] = "fixed-version: Fixed from version 5.9rc4"
+CVE_STATUS[CVE-2022-49523] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25284] = "fixed-version: Fixed from version 5.9rc5"
+CVE_STATUS[CVE-2022-49524] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25285] = "fixed-version: Fixed from version 5.9rc4"
+CVE_STATUS[CVE-2022-49525] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25639] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-49526] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25641] = "fixed-version: Fixed from version 5.9rc4"
+CVE_STATUS[CVE-2022-49527] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25643] = "fixed-version: Fixed from version 5.9rc7"
+CVE_STATUS[CVE-2022-49528] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25645] = "fixed-version: Fixed from version 5.9rc7"
+CVE_STATUS[CVE-2022-49529] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25656] = "fixed-version: Fixed from version 5.10rc2"
+CVE_STATUS[CVE-2022-49530] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-25661 has no known resolution
+CVE_STATUS[CVE-2022-49531] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-25662 has no known resolution
+CVE_STATUS[CVE-2022-49532] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25668] = "fixed-version: Fixed from version 5.10rc3"
+CVE_STATUS[CVE-2022-49533] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25669] = "fixed-version: Fixed from version 5.10rc5"
+CVE_STATUS[CVE-2022-49534] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25670] = "fixed-version: Fixed from version 5.12rc7"
+CVE_STATUS[CVE-2022-49535] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25671] = "fixed-version: Fixed from version 5.12rc7"
+CVE_STATUS[CVE-2022-49536] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25672] = "fixed-version: Fixed from version 5.12rc7"
+CVE_STATUS[CVE-2022-49537] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25673] = "fixed-version: Fixed from version 5.12rc7"
+CVE_STATUS[CVE-2022-49538] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25704] = "fixed-version: Fixed from version 5.10rc3"
+CVE_STATUS[CVE-2022-49539] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-25705] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49540] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-26088] = "fixed-version: Fixed from version 5.9rc1"
+CVE_STATUS[CVE-2022-49541] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-26139] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-49542] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-26140 has no known resolution
+CVE_STATUS[CVE-2022-49543] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-26141] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-49544] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-26142 has no known resolution
+CVE_STATUS[CVE-2022-49545] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-26143 has no known resolution
+CVE_STATUS[CVE-2022-49546] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-26145] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-49547] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-26147] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-49548] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-26541] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49549] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-26555] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49550] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-26556 has no known resolution
+CVE_STATUS[CVE-2022-49551] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-26557 has no known resolution
+CVE_STATUS[CVE-2022-49552] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-26558] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49553] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-26559 has no known resolution
+CVE_STATUS[CVE-2022-49554] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-26560 has no known resolution
+CVE_STATUS[CVE-2022-49555] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27066] = "fixed-version: Fixed from version 5.6"
+CVE_STATUS[CVE-2022-49556] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27067] = "fixed-version: Fixed from version 4.14rc4"
+CVE_STATUS[CVE-2022-49557] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27068] = "fixed-version: Fixed from version 5.6rc2"
+CVE_STATUS[CVE-2022-49558] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27152] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49559] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27170] = "fixed-version: Fixed from version 5.12rc5"
+CVE_STATUS[CVE-2022-49560] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27171] = "fixed-version: Fixed from version 5.12rc5"
+CVE_STATUS[CVE-2022-49561] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27194] = "fixed-version: Fixed from version 5.9"
+CVE_STATUS[CVE-2022-49562] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-2732] = "fixed-version: Fixed from version 5.6rc4"
+CVE_STATUS[CVE-2022-49563] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27418] = "fixed-version: Fixed from version 5.6rc5"
+CVE_STATUS[CVE-2022-49564] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27673] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49565] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27675] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49566] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27777] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49567] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27784] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49568] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27786] = "fixed-version: Fixed from version 5.7rc6"
+CVE_STATUS[CVE-2022-49569] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27815] = "fixed-version: Fixed from version 5.11rc1"
+CVE_STATUS[CVE-2022-49570] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27820] = "fixed-version: Fixed from version 5.16rc1"
+CVE_STATUS[CVE-2022-49571] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27825] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49572] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27830] = "fixed-version: Fixed from version 5.10rc7"
+CVE_STATUS[CVE-2022-49573] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-27835] = "fixed-version: Fixed from version 5.10rc6"
+CVE_STATUS[CVE-2022-49574] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-28097] = "fixed-version: Fixed from version 5.9rc6"
+CVE_STATUS[CVE-2022-49575] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-28374] = "fixed-version: Fixed from version 5.11rc4"
+CVE_STATUS[CVE-2022-49576] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-28588] = "fixed-version: Fixed from version 5.10rc7"
+CVE_STATUS[CVE-2022-49577] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-28915] = "fixed-version: Fixed from version 5.9"
+CVE_STATUS[CVE-2022-49578] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-28941] = "fixed-version: Fixed from version 5.10rc5"
+CVE_STATUS[CVE-2022-49579] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-28974] = "fixed-version: Fixed from version 5.10rc3"
+CVE_STATUS[CVE-2022-49580] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-29368] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49581] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-29369] = "fixed-version: Fixed from version 5.8rc7"
+CVE_STATUS[CVE-2022-49582] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-29370] = "fixed-version: Fixed from version 5.6rc7"
+CVE_STATUS[CVE-2022-49583] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-29371] = "fixed-version: Fixed from version 5.9rc2"
+CVE_STATUS[CVE-2022-49584] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-29372] = "fixed-version: Fixed from version 5.7rc3"
+CVE_STATUS[CVE-2022-49585] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-29373] = "fixed-version: Fixed from version 5.6rc2"
+CVE_STATUS[CVE-2022-49586] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-29374] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49587] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-29534] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49588] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-29568] = "fixed-version: Fixed from version 5.11rc1"
+CVE_STATUS[CVE-2022-49589] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-29569] = "fixed-version: Fixed from version 5.11rc1"
+CVE_STATUS[CVE-2022-49590] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-29660] = "fixed-version: Fixed from version 5.10rc7"
+CVE_STATUS[CVE-2022-49591] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-29661] = "fixed-version: Fixed from version 5.10rc7"
+CVE_STATUS[CVE-2022-49592] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-35499] = "fixed-version: Fixed from version 5.11rc1"
+CVE_STATUS[CVE-2022-49593] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-35501 has no known resolution
+CVE_STATUS[CVE-2022-49594] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-35508] = "fixed-version: Fixed from version 5.10rc3"
+CVE_STATUS[CVE-2022-49595] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-35513] = "fixed-version: Fixed from version 4.17rc1"
+CVE_STATUS[CVE-2022-49596] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-35519] = "fixed-version: Fixed from version 5.10rc7"
+CVE_STATUS[CVE-2022-49597] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36158] = "fixed-version: Fixed from version 5.11rc1"
+CVE_STATUS[CVE-2022-49598] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36310] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49599] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36311] = "fixed-version: Fixed from version 5.9rc5"
+CVE_STATUS[CVE-2022-49600] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36312] = "fixed-version: Fixed from version 5.9rc5"
+CVE_STATUS[CVE-2022-49601] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36313] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49602] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36322] = "fixed-version: Fixed from version 5.11rc1"
+CVE_STATUS[CVE-2022-49603] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36385] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49604] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36386] = "fixed-version: Fixed from version 5.9rc1"
+CVE_STATUS[CVE-2022-49605] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36387] = "fixed-version: Fixed from version 5.9rc1"
+CVE_STATUS[CVE-2022-49606] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36516] = "fixed-version: Fixed from version 5.17rc2"
+CVE_STATUS[CVE-2022-49607] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36557] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49608] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36558] = "fixed-version: Fixed from version 5.6rc3"
+CVE_STATUS[CVE-2022-49609] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36691] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49610] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36694] = "fixed-version: Fixed from version 5.10"
+CVE_STATUS[CVE-2022-49611] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36766] = "fixed-version: Fixed from version 5.9rc1"
+CVE_STATUS[CVE-2022-49612] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36775] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49613] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36776] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49615] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36777] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49616] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36778] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49617] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36779] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49618] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36780] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49619] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36781] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49620] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36782] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49621] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36783] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49622] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36784] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49623] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36785] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49624] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36786] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49625] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-36787] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49626] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-3702] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-49627] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-4788] = "fixed-version: Fixed from version 5.10rc5"
+CVE_STATUS[CVE-2022-49628] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-7053] = "fixed-version: Fixed from version 5.2rc1"
+CVE_STATUS[CVE-2022-49629] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-8428] = "fixed-version: Fixed from version 5.5"
+CVE_STATUS[CVE-2022-49630] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-8647] = "fixed-version: Fixed from version 5.6rc5"
+CVE_STATUS[CVE-2022-49631] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-8648] = "fixed-version: Fixed from version 5.6rc3"
+CVE_STATUS[CVE-2022-49632] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-8649] = "fixed-version: Fixed from version 5.6rc5"
+CVE_STATUS[CVE-2022-49633] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-8694] = "fixed-version: Fixed from version 5.10rc4"
+CVE_STATUS[CVE-2022-49634] = "fixed-version: Fixed from version 5.19"
-# CVE-2020-8832 has no known resolution
+CVE_STATUS[CVE-2022-49635] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-8834] = "fixed-version: Fixed from version 4.18rc1"
+CVE_STATUS[CVE-2022-49636] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-8835] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49637] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-8992] = "fixed-version: Fixed from version 5.6rc2"
+CVE_STATUS[CVE-2022-49638] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-9383] = "fixed-version: Fixed from version 5.6rc4"
+CVE_STATUS[CVE-2022-49639] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2020-9391] = "fixed-version: Fixed from version 5.6rc3"
+CVE_STATUS[CVE-2022-49640] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-0129] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49641] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-0342] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49642] = "fixed-version: Fixed from version 5.19"
-# CVE-2021-0399 has no known resolution
+CVE_STATUS[CVE-2022-49643] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-0447] = "fixed-version: Fixed from version 4.15rc1"
+CVE_STATUS[CVE-2022-49644] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-0448] = "fixed-version: Fixed from version 5.9rc7"
+CVE_STATUS[CVE-2022-49645] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-0512] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-49646] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-0605] = "fixed-version: Fixed from version 5.8"
+CVE_STATUS[CVE-2022-49647] = "fixed-version: Fixed from version 5.19"
-# CVE-2021-0606 has no known resolution
+CVE_STATUS[CVE-2022-49648] = "fixed-version: Fixed from version 5.19"
-# CVE-2021-0695 has no known resolution
+CVE_STATUS[CVE-2022-49649] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-0707] = "fixed-version: Fixed from version 5.11rc3"
+CVE_STATUS[CVE-2022-49650] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-0920] = "fixed-version: Fixed from version 5.14rc4"
+CVE_STATUS[CVE-2022-49651] = "fixed-version: Fixed from version 5.19"
-# CVE-2021-0924 has no known resolution
+CVE_STATUS[CVE-2022-49652] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-0929] = "fixed-version: Fixed from version 5.6rc1"
+CVE_STATUS[CVE-2022-49653] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-0935] = "fixed-version: Fixed from version 4.16rc7"
+CVE_STATUS[CVE-2022-49654] = "fixed-version: Fixed from version 5.19"
-# CVE-2021-0936 has no known resolution
+CVE_STATUS[CVE-2022-49655] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-0937] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49656] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-0938] = "fixed-version: Fixed from version 5.10rc4"
+CVE_STATUS[CVE-2022-49657] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-0941] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-49658] = "fixed-version: Fixed from version 5.19"
-# CVE-2021-0961 has no known resolution
+CVE_STATUS[CVE-2022-49659] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-1048] = "fixed-version: Fixed from version 5.9rc4"
+CVE_STATUS[CVE-2022-49661] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-20177] = "fixed-version: Fixed from version 5.5rc1"
+CVE_STATUS[CVE-2022-49662] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-20194] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49663] = "fixed-version: Fixed from version 5.19"
-# CVE-2021-20219 has no known resolution
+CVE_STATUS[CVE-2022-49664] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-20226] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-49665] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-20239] = "fixed-version: Fixed from version 5.9rc1"
+CVE_STATUS[CVE-2022-49666] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-20261] = "fixed-version: Fixed from version 4.5rc5"
+CVE_STATUS[CVE-2022-49667] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-20265] = "fixed-version: Fixed from version 4.5rc3"
+CVE_STATUS[CVE-2022-49668] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-20268] = "fixed-version: Fixed from version 5.11rc5"
+CVE_STATUS[CVE-2022-49669] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-20292] = "fixed-version: Fixed from version 5.9rc1"
+CVE_STATUS[CVE-2022-49670] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-20317] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49671] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-20320] = "fixed-version: Fixed from version 5.15rc3"
+CVE_STATUS[CVE-2022-49672] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-20321] = "fixed-version: Fixed from version 5.15rc5"
+CVE_STATUS[CVE-2022-49673] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-20322] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-49674] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-21781] = "fixed-version: Fixed from version 5.11rc7"
+CVE_STATUS[CVE-2022-49675] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-22543] = "fixed-version: Fixed from version 5.13"
+CVE_STATUS[CVE-2022-49676] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-22555] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49677] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-22600] = "fixed-version: Fixed from version 5.16rc6"
+CVE_STATUS[CVE-2022-49678] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-23133] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49679] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-23134] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49680] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-26401] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-49681] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-26708] = "fixed-version: Fixed from version 5.11rc7"
+CVE_STATUS[CVE-2022-49682] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-26930] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-49683] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-26931] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-49684] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-26932] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-49685] = "fixed-version: Fixed from version 5.19"
-# CVE-2021-26934 has no known resolution
+CVE_STATUS[CVE-2022-49686] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-27363] = "fixed-version: Fixed from version 5.12rc2"
+CVE_STATUS[CVE-2022-49687] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-27364] = "fixed-version: Fixed from version 5.12rc2"
+CVE_STATUS[CVE-2022-49688] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-27365] = "fixed-version: Fixed from version 5.12rc2"
+CVE_STATUS[CVE-2022-49691] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28038] = "fixed-version: Fixed from version 5.12rc2"
+CVE_STATUS[CVE-2022-49692] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28039] = "fixed-version: Fixed from version 5.12rc2"
+CVE_STATUS[CVE-2022-49693] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28375] = "fixed-version: Fixed from version 5.12rc3"
+CVE_STATUS[CVE-2022-49694] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28660] = "fixed-version: Fixed from version 5.12rc3"
+CVE_STATUS[CVE-2022-49695] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28688] = "fixed-version: Fixed from version 5.12rc6"
+CVE_STATUS[CVE-2022-49696] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28691] = "fixed-version: Fixed from version 5.13rc6"
+CVE_STATUS[CVE-2022-49697] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28711] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-49698] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28712] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-49699] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28713] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-49700] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28714] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-49701] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28715] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-49702] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28950] = "fixed-version: Fixed from version 5.12rc4"
+CVE_STATUS[CVE-2022-49703] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28951] = "fixed-version: Fixed from version 5.12rc2"
+CVE_STATUS[CVE-2022-49704] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28952] = "fixed-version: Fixed from version 5.12rc4"
+CVE_STATUS[CVE-2022-49705] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28964] = "fixed-version: Fixed from version 5.12rc4"
+CVE_STATUS[CVE-2022-49706] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28971] = "fixed-version: Fixed from version 5.12rc4"
+CVE_STATUS[CVE-2022-49707] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-28972] = "fixed-version: Fixed from version 5.12rc4"
+CVE_STATUS[CVE-2022-49708] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-29154] = "fixed-version: Fixed from version 5.12rc7"
+CVE_STATUS[CVE-2022-49709] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-29155] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49710] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-29264] = "fixed-version: Fixed from version 5.12rc3"
+CVE_STATUS[CVE-2022-49711] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-29265] = "fixed-version: Fixed from version 5.12rc3"
+CVE_STATUS[CVE-2022-49712] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-29266] = "fixed-version: Fixed from version 5.12rc4"
+CVE_STATUS[CVE-2022-49713] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-29646] = "fixed-version: Fixed from version 5.12rc5"
+CVE_STATUS[CVE-2022-49714] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-29647] = "fixed-version: Fixed from version 5.12rc5"
+CVE_STATUS[CVE-2022-49715] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-29648] = "fixed-version: Fixed from version 5.12rc5"
+CVE_STATUS[CVE-2022-49716] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-29649] = "fixed-version: Fixed from version 5.12rc5"
+CVE_STATUS[CVE-2022-49717] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-29650] = "fixed-version: Fixed from version 5.12rc5"
+CVE_STATUS[CVE-2022-49718] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-29657] = "fixed-version: Fixed from version 5.12rc6"
+CVE_STATUS[CVE-2022-49719] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-30002] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-49720] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-30178] = "fixed-version: Fixed from version 5.12rc2"
+CVE_STATUS[CVE-2022-49721] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-31440] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49722] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-3178] = "fixed-version: Fixed from version 5.11rc5"
+CVE_STATUS[CVE-2022-49723] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-31829] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49724] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-31916] = "fixed-version: Fixed from version 5.12rc5"
+CVE_STATUS[CVE-2022-49725] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-32078] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49726] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-32399] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49727] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-32606] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-49728] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-33033] = "fixed-version: Fixed from version 5.12rc3"
+CVE_STATUS[CVE-2022-49729] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-33034] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49731] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-33061] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-49732] = "fixed-version: Fixed from version 5.19"
-CVE_STATUS[CVE-2021-33098] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-49733] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-33135] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-49738] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-33200] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-49739] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-3347] = "fixed-version: Fixed from version 5.11rc6"
+CVE_STATUS[CVE-2022-49740] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-3348] = "fixed-version: Fixed from version 5.11rc6"
+CVE_STATUS[CVE-2022-49741] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-33624] = "fixed-version: Fixed from version 5.13rc7"
+CVE_STATUS[CVE-2022-49742] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-33630] = "fixed-version: Fixed from version 5.4rc1"
+CVE_STATUS[CVE-2022-49743] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-33631] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-49744] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-33655] = "fixed-version: Fixed from version 5.19rc6"
+CVE_STATUS[CVE-2022-49745] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-33656] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-49746] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-33909] = "fixed-version: Fixed from version 5.14rc3"
+CVE_STATUS[CVE-2022-49747] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-3411] = "fixed-version: Fixed from version 5.10"
+CVE_STATUS[CVE-2022-49748] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-3428] = "fixed-version: Fixed from version 5.9rc2"
+CVE_STATUS[CVE-2022-49749] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-3444] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-49750] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-34556] = "fixed-version: Fixed from version 5.14rc4"
+CVE_STATUS[CVE-2022-49751] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-34693] = "fixed-version: Fixed from version 5.13rc7"
+CVE_STATUS[CVE-2022-49752] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-3483] = "fixed-version: Fixed from version 5.12rc6"
+CVE_STATUS[CVE-2022-49753] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-34866] = "fixed-version: Fixed from version 5.14"
+CVE_STATUS[CVE-2022-49754] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-3489] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-49755] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-3490] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-49756] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-3491] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49757] = "fixed-version: Fixed from version 6.2"
-# CVE-2021-3492 has no known resolution
+CVE_STATUS[CVE-2022-49758] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-3493] = "fixed-version: Fixed from version 5.11rc1"
+CVE_STATUS[CVE-2022-49759] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-34981] = "fixed-version: Fixed from version 5.14rc1"
+CVE_STATUS[CVE-2022-49760] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-3501] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49761] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2021-35039] = "fixed-version: Fixed from version 5.13"
+CVE_STATUS[CVE-2022-49762] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3506] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49763] = "fixed-version: Fixed from version 6.1"
-# CVE-2021-3542 has no known resolution
+CVE_STATUS[CVE-2022-49764] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3543] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49765] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-35477] = "fixed-version: Fixed from version 5.14rc4"
+CVE_STATUS[CVE-2022-49766] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3564] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-49767] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3573] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-49768] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3587] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-49769] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3600] = "fixed-version: Fixed from version 5.11"
+CVE_STATUS[CVE-2022-49770] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3609] = "fixed-version: Fixed from version 5.14rc1"
+CVE_STATUS[CVE-2022-49771] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3612] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-49772] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3635] = "fixed-version: Fixed from version 5.5rc7"
+CVE_STATUS[CVE-2022-49773] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3640] = "fixed-version: Fixed from version 5.16rc1"
+CVE_STATUS[CVE-2022-49774] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3653] = "fixed-version: Fixed from version 5.14rc7"
+CVE_STATUS[CVE-2022-49775] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3655] = "fixed-version: Fixed from version 5.14rc1"
+CVE_STATUS[CVE-2022-49776] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3656] = "fixed-version: Fixed from version 5.14rc7"
+CVE_STATUS[CVE-2022-49777] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3659] = "fixed-version: Fixed from version 5.12rc7"
+CVE_STATUS[CVE-2022-49778] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3669] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-49779] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3679] = "fixed-version: Fixed from version 5.14rc3"
+CVE_STATUS[CVE-2022-49780] = "fixed-version: Fixed from version 6.1"
-# CVE-2021-3714 has no known resolution
+CVE_STATUS[CVE-2022-49781] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3715] = "fixed-version: Fixed from version 5.6"
+CVE_STATUS[CVE-2022-49782] = "fixed-version: Fixed from version 6.0.10"
-CVE_STATUS[CVE-2021-37159] = "fixed-version: Fixed from version 5.14rc3"
+CVE_STATUS[CVE-2022-49783] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3732] = "fixed-version: Fixed from version 5.14rc6"
+CVE_STATUS[CVE-2022-49784] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3736] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-49785] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3739] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-49786] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3743] = "fixed-version: Fixed from version 5.13rc7"
+CVE_STATUS[CVE-2022-49787] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3744] = "fixed-version: Fixed from version 5.15rc4"
+CVE_STATUS[CVE-2022-49788] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3752] = "fixed-version: Fixed from version 5.16rc1"
+CVE_STATUS[CVE-2022-49789] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3753] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-49790] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-37576] = "fixed-version: Fixed from version 5.14rc3"
+CVE_STATUS[CVE-2022-49791] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3759] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-49792] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3760] = "fixed-version: Fixed from version 5.15rc6"
+CVE_STATUS[CVE-2022-49793] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3764] = "fixed-version: Fixed from version 5.15rc4"
+CVE_STATUS[CVE-2022-49794] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3772] = "fixed-version: Fixed from version 5.15"
+CVE_STATUS[CVE-2022-49795] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38160] = "fixed-version: Fixed from version 5.14rc1"
+CVE_STATUS[CVE-2022-49796] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38166] = "fixed-version: Fixed from version 5.14rc6"
+CVE_STATUS[CVE-2022-49797] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38198] = "fixed-version: Fixed from version 5.13rc6"
+CVE_STATUS[CVE-2022-49798] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38199] = "fixed-version: Fixed from version 5.14rc1"
+CVE_STATUS[CVE-2022-49799] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38200] = "fixed-version: Fixed from version 5.13rc7"
+CVE_STATUS[CVE-2022-49800] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38201] = "fixed-version: Fixed from version 5.14rc1"
+CVE_STATUS[CVE-2022-49801] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38202] = "fixed-version: Fixed from version 5.14rc1"
+CVE_STATUS[CVE-2022-49802] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38203] = "fixed-version: Fixed from version 5.14rc2"
+CVE_STATUS[CVE-2022-49803] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38204] = "fixed-version: Fixed from version 5.14rc3"
+CVE_STATUS[CVE-2022-49804] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38205] = "fixed-version: Fixed from version 5.14rc1"
+CVE_STATUS[CVE-2022-49805] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38206] = "fixed-version: Fixed from version 5.13rc7"
+CVE_STATUS[CVE-2022-49806] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38207] = "fixed-version: Fixed from version 5.13rc7"
+CVE_STATUS[CVE-2022-49807] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38208] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-49808] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38209] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49809] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-38300] = "fixed-version: Fixed from version 5.15rc4"
+CVE_STATUS[CVE-2022-49810] = "fixed-version: Fixed from version 6.1"
-# CVE-2021-3847 has no known resolution
+CVE_STATUS[CVE-2022-49811] = "fixed-version: Fixed from version 6.1"
-# CVE-2021-3864 has no known resolution
+CVE_STATUS[CVE-2022-49812] = "fixed-version: Fixed from version 6.1"
-# CVE-2021-3892 has no known resolution
+CVE_STATUS[CVE-2022-49813] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3894] = "fixed-version: Fixed from version 5.15rc6"
+CVE_STATUS[CVE-2022-49814] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3896] = "fixed-version: Fixed from version 5.15rc6"
+CVE_STATUS[CVE-2022-49815] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-3923] = "fixed-version: Fixed from version 5.16"
+CVE_STATUS[CVE-2022-49817] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-39633] = "fixed-version: Fixed from version 5.14"
+CVE_STATUS[CVE-2022-49818] = "fixed-version: Fixed from version 6.0.10"
-CVE_STATUS[CVE-2021-39634] = "fixed-version: Fixed from version 5.9rc8"
+CVE_STATUS[CVE-2022-49819] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-39636] = "fixed-version: Fixed from version 4.16rc1"
+CVE_STATUS[CVE-2022-49820] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-39648] = "fixed-version: Fixed from version 5.11rc3"
+CVE_STATUS[CVE-2022-49821] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-39656] = "fixed-version: Fixed from version 5.12rc3"
+CVE_STATUS[CVE-2022-49822] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-39657] = "fixed-version: Fixed from version 5.11rc4"
+CVE_STATUS[CVE-2022-49823] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-39685] = "fixed-version: Fixed from version 5.16rc5"
+CVE_STATUS[CVE-2022-49824] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-39686] = "fixed-version: Fixed from version 5.16rc1"
+CVE_STATUS[CVE-2022-49825] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-39698] = "fixed-version: Fixed from version 5.16rc5"
+CVE_STATUS[CVE-2022-49826] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-39711] = "fixed-version: Fixed from version 4.18rc6"
+CVE_STATUS[CVE-2022-49827] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-39713] = "fixed-version: Fixed from version 4.20rc1"
+CVE_STATUS[CVE-2022-49828] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-39714] = "fixed-version: Fixed from version 4.12rc1"
+CVE_STATUS[CVE-2022-49829] = "fixed-version: Fixed from version 6.1"
-# CVE-2021-39800 has no known resolution
+CVE_STATUS[CVE-2022-49830] = "fixed-version: Fixed from version 6.1"
-# CVE-2021-39801 has no known resolution
+CVE_STATUS[CVE-2022-49831] = "fixed-version: Fixed from version 6.1"
-# CVE-2021-39802 has no known resolution
+CVE_STATUS[CVE-2022-49832] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4001] = "fixed-version: Fixed from version 5.16rc2"
+CVE_STATUS[CVE-2022-49833] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4002] = "fixed-version: Fixed from version 5.16rc3"
+CVE_STATUS[CVE-2022-49834] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4023] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-49835] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4028] = "fixed-version: Fixed from version 5.15rc4"
+CVE_STATUS[CVE-2022-49836] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4032] = "fixed-version: Fixed from version 5.15rc7"
+CVE_STATUS[CVE-2022-49837] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4037] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-49838] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-40490] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-49839] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4083] = "fixed-version: Fixed from version 5.16rc4"
+CVE_STATUS[CVE-2022-49840] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4090] = "fixed-version: Fixed from version 5.16rc2"
+CVE_STATUS[CVE-2022-49841] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4093] = "fixed-version: Fixed from version 5.15rc7"
+CVE_STATUS[CVE-2022-49842] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4095] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-49844] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-41073] = "fixed-version: Fixed from version 5.15rc2"
+CVE_STATUS[CVE-2022-49845] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4135] = "fixed-version: Fixed from version 5.16rc6"
+CVE_STATUS[CVE-2022-49846] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4148] = "fixed-version: Fixed from version 5.15"
+CVE_STATUS[CVE-2022-49847] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4149] = "fixed-version: Fixed from version 5.15rc6"
+CVE_STATUS[CVE-2022-49848] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4150] = "fixed-version: Fixed from version 5.15rc7"
+CVE_STATUS[CVE-2022-49849] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4154] = "fixed-version: Fixed from version 5.14rc2"
+CVE_STATUS[CVE-2022-49850] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4155] = "fixed-version: Fixed from version 5.16"
+CVE_STATUS[CVE-2022-49851] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4157] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49852] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4159] = "fixed-version: Fixed from version 5.7rc1"
+CVE_STATUS[CVE-2022-49853] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-41864] = "fixed-version: Fixed from version 5.15rc5"
+CVE_STATUS[CVE-2022-49854] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4197] = "fixed-version: Fixed from version 5.16"
+CVE_STATUS[CVE-2022-49855] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-42008] = "fixed-version: Fixed from version 5.14rc7"
+CVE_STATUS[CVE-2022-49857] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4202] = "fixed-version: Fixed from version 5.16rc2"
+CVE_STATUS[CVE-2022-49858] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4203] = "fixed-version: Fixed from version 5.15rc4"
+CVE_STATUS[CVE-2022-49859] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4204] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-49860] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-4218] = "fixed-version: Fixed from version 5.8rc1"
+CVE_STATUS[CVE-2022-49861] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-42252] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-49862] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-42327] = "fixed-version: Fixed from version 5.15"
+CVE_STATUS[CVE-2022-49863] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-42739] = "fixed-version: Fixed from version 5.16rc1"
+CVE_STATUS[CVE-2022-49864] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-43056] = "fixed-version: Fixed from version 5.15rc6"
+CVE_STATUS[CVE-2022-49865] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-43057] = "fixed-version: Fixed from version 5.15rc3"
+CVE_STATUS[CVE-2022-49866] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-43267] = "fixed-version: Fixed from version 5.15"
+CVE_STATUS[CVE-2022-49867] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-43389] = "fixed-version: Fixed from version 5.15rc6"
+CVE_STATUS[CVE-2022-49868] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-43975] = "fixed-version: Fixed from version 5.16rc2"
+CVE_STATUS[CVE-2022-49869] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-43976] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-49870] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-44733] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-49871] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-44879] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-49872] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-45095] = "fixed-version: Fixed from version 5.16rc6"
+CVE_STATUS[CVE-2022-49873] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-45100] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-49874] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-45402] = "fixed-version: Fixed from version 5.16rc6"
+CVE_STATUS[CVE-2022-49875] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-45469] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-49876] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-45480] = "fixed-version: Fixed from version 5.16rc6"
+CVE_STATUS[CVE-2022-49877] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-45485] = "fixed-version: Fixed from version 5.14rc1"
+CVE_STATUS[CVE-2022-49878] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-45486] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49879] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-45868] = "fixed-version: Fixed from version 5.16rc1"
+CVE_STATUS[CVE-2022-49880] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46283] = "fixed-version: Fixed from version 5.13rc7"
+CVE_STATUS[CVE-2022-49881] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46904] = "fixed-version: Fixed from version 5.12rc7"
+CVE_STATUS[CVE-2022-49882] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46905] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49883] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46906] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-49884] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46908] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49885] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46909] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49886] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46910] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49887] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46911] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49888] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46912] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49889] = "fixed-version: Fixed from version 6.0.8"
-CVE_STATUS[CVE-2021-46913] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49890] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46914] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49891] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46915] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49892] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46916] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49893] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46917] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49894] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46918] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49895] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46919] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49896] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46920] = "fixed-version: Fixed from version 5.12rc8"
+CVE_STATUS[CVE-2022-49898] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46921] = "fixed-version: Fixed from version 5.12"
+CVE_STATUS[CVE-2022-49899] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46922] = "fixed-version: Fixed from version 5.12"
+CVE_STATUS[CVE-2022-49900] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46923] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-49901] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46924] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-49902] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46925] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-49903] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46926] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-49904] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46927] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-49905] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46928] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-49906] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46929] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-49907] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46930] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-49908] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46931] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-49910] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46932] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-49911] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46933] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-49912] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46934] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-49913] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46935] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-49914] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46936] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-49915] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46937] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-49916] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46938] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49917] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46939] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49918] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46940] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49919] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46941] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49920] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46942] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49921] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46943] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49922] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46944] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49923] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46945] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49924] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46947] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49925] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46948] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49926] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46949] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49927] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46950] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49928] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46951] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49929] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46952] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49930] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46953] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49931] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2021-46954] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49932] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2021-46955] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49934] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46956] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49935] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46957] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49936] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46958] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49937] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46959] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49938] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46960] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49939] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46961] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49940] = "fixed-version: Fixed from version 5.19.8"
-CVE_STATUS[CVE-2021-46962] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49942] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46963] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49943] = "fixed-version: Fixed from version 5.19.8"
-CVE_STATUS[CVE-2021-46964] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49944] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46965] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49945] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46966] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49946] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46967] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49947] = "fixed-version: Fixed from version 5.19.8"
-CVE_STATUS[CVE-2021-46968] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49948] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46969] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49949] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46970] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49950] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46971] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49951] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46972] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49952] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46973] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49953] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46974] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49954] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46976] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49955] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46977] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49956] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46978] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49957] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46979] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49958] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46980] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49959] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46981] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49960] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46982] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49961] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46983] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49962] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46984] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49963] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46985] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49964] = "fixed-version: Fixed from version 5.19.7"
-CVE_STATUS[CVE-2021-46986] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49965] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46987] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49966] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46988] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49967] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46989] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49968] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46990] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49969] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46991] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49970] = "fixed-version: Fixed from version 5.19.8"
-CVE_STATUS[CVE-2021-46992] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49971] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46993] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49972] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46994] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49973] = "fixed-version: Fixed from version 5.19.8"
-CVE_STATUS[CVE-2021-46995] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49974] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46996] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49975] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46997] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49976] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46998] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49977] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-46999] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49978] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47000] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49979] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47001] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49980] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47002] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49981] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47003] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49982] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47004] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49983] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47005] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49984] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47006] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49985] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47007] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49986] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47008] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49987] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47009] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-49989] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47010] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49990] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47011] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49991] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47012] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49992] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47013] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49993] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47014] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49994] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47015] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49995] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47016] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49996] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47017] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49997] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47018] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49998] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47019] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-49999] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47020] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50000] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47021] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50001] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47022] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50002] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47023] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50003] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47024] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50004] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47025] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50005] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47026] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50006] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47027] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50007] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47028] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50008] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47029] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50009] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47030] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50010] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47031] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50011] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47032] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50012] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47033] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50013] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47034] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50014] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47035] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50015] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47036] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50016] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47037] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50017] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47038] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50019] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47039] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50020] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47040] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50021] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47041] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50022] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47042] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50023] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47043] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50024] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47044] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50025] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47045] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50026] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47046] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50027] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47047] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50028] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47048] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50029] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47049] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50030] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47050] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50032] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47051] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50033] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47052] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50034] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47053] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50035] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47054] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50036] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47055] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50037] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47056] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50038] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47057] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50039] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47058] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50040] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47059] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50041] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47060] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50042] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47061] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50043] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47062] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50044] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47063] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50045] = "fixed-version: Fixed from version 5.19.4"
-CVE_STATUS[CVE-2021-47064] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50046] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47065] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50047] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47066] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50048] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47067] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50049] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47068] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50050] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47069] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50051] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47070] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50052] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47071] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50053] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47072] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50054] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47073] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50055] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47074] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50056] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47075] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50057] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47076] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50058] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47077] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50059] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47078] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50060] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47079] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50061] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47080] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50062] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47081] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50063] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47082] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50064] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47083] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50065] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47086] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50066] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47087] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50067] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47088] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50068] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47089] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50069] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47090] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50070] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47091] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50071] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47092] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50072] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47093] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50073] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47094] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50074] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47095] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50075] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47096] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50076] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47097] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50077] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47098] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50078] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47099] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50079] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47100] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50080] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47101] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50082] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47102] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50084] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47103] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50085] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47104] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50086] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47105] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50087] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47106] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50088] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47107] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50089] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47108] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50090] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47109] = "fixed-version: Fixed from version 5.13rc7"
+CVE_STATUS[CVE-2022-50091] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47110] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-50092] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47111] = "fixed-version: Fixed from version 5.13rc6"
+CVE_STATUS[CVE-2022-50093] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47112] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-50094] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47113] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50095] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47114] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50096] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47116] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50097] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47117] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50098] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47118] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50099] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47119] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50100] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47120] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50101] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47121] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50102] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47122] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50103] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47123] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-50104] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47124] = "fixed-version: Fixed from version 5.13rc2"
+CVE_STATUS[CVE-2022-50105] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47125] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50106] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47126] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50107] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47127] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50108] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47128] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50109] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47129] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50110] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47130] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50111] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47131] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50112] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47132] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50113] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47133] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50114] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47134] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50115] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47135] = "fixed-version: Fixed from version 5.13rc5"
+CVE_STATUS[CVE-2022-50116] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47136] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50117] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47137] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50118] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47138] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50119] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47139] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50120] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47140] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50121] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47141] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50122] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47142] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50123] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47143] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50124] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47144] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50125] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47145] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50126] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47146] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50127] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47147] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50129] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47148] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50130] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47149] = "fixed-version: Fixed from version 5.13rc3"
+CVE_STATUS[CVE-2022-50131] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47150] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50132] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47151] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50133] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47152] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50134] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47153] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50135] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47158] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50136] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47159] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50137] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47160] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50138] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47161] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50139] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47162] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50140] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47163] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50141] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47164] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50142] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47165] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50143] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47166] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50144] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47167] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50145] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47168] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50146] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47169] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50147] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47170] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50148] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47171] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50149] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47172] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50151] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47173] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50152] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47174] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50153] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47175] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50154] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47176] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50155] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47177] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50156] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47178] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50157] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47179] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50158] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2021-47180] = "fixed-version: Fixed from version 5.13rc4"
+CVE_STATUS[CVE-2022-50159] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0001] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50160] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0002] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50161] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0168] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50162] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0171] = "fixed-version: Fixed from version 5.18rc4"
+CVE_STATUS[CVE-2022-50163] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0185] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50164] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0264] = "fixed-version: Fixed from version 5.16rc6"
+CVE_STATUS[CVE-2022-50165] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0286] = "fixed-version: Fixed from version 5.14rc2"
+CVE_STATUS[CVE-2022-50166] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0322] = "fixed-version: Fixed from version 5.15rc6"
+CVE_STATUS[CVE-2022-50167] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0330] = "fixed-version: Fixed from version 5.17rc2"
+CVE_STATUS[CVE-2022-50168] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0382] = "fixed-version: Fixed from version 5.16"
+CVE_STATUS[CVE-2022-50169] = "fixed-version: Fixed from version 6.0"
-# CVE-2022-0400 has no known resolution
+CVE_STATUS[CVE-2022-50170] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0433] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50171] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0435] = "fixed-version: Fixed from version 5.17rc4"
+CVE_STATUS[CVE-2022-50172] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0480] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-50173] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0487] = "fixed-version: Fixed from version 5.17rc4"
+CVE_STATUS[CVE-2022-50174] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0492] = "fixed-version: Fixed from version 5.17rc3"
+CVE_STATUS[CVE-2022-50175] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0494] = "fixed-version: Fixed from version 5.17rc5"
+CVE_STATUS[CVE-2022-50176] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0500] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50177] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0516] = "fixed-version: Fixed from version 5.17rc4"
+CVE_STATUS[CVE-2022-50178] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0617] = "fixed-version: Fixed from version 5.17rc2"
+CVE_STATUS[CVE-2022-50179] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0644] = "fixed-version: Fixed from version 5.15rc7"
+CVE_STATUS[CVE-2022-50181] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0646] = "fixed-version: Fixed from version 5.17rc5"
+CVE_STATUS[CVE-2022-50182] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0742] = "fixed-version: Fixed from version 5.17rc7"
+CVE_STATUS[CVE-2022-50183] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0812] = "fixed-version: Fixed from version 5.8rc6"
+CVE_STATUS[CVE-2022-50184] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0847] = "fixed-version: Fixed from version 5.17rc6"
+CVE_STATUS[CVE-2022-50185] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0850] = "fixed-version: Fixed from version 5.14rc1"
+CVE_STATUS[CVE-2022-50186] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0854] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50187] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0995] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50188] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-0998] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50189] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1011] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50190] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1012] = "fixed-version: Fixed from version 5.18rc6"
+CVE_STATUS[CVE-2022-50191] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1015] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50192] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1016] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50193] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1043] = "fixed-version: Fixed from version 5.14rc7"
+CVE_STATUS[CVE-2022-50194] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1048] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50195] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1055] = "fixed-version: Fixed from version 5.17rc3"
+CVE_STATUS[CVE-2022-50196] = "fixed-version: Fixed from version 6.0"
-# CVE-2022-1116 has no known resolution
+CVE_STATUS[CVE-2022-50197] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1158] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50198] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1184] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50199] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1195] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50200] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1198] = "fixed-version: Fixed from version 5.17rc6"
+CVE_STATUS[CVE-2022-50201] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1199] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50202] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1204] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50203] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1205] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50204] = "fixed-version: Fixed from version 6.0"
-# CVE-2022-1247 has no known resolution
+CVE_STATUS[CVE-2022-50205] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1263] = "fixed-version: Fixed from version 5.18rc3"
+CVE_STATUS[CVE-2022-50206] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1280] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-50207] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1353] = "fixed-version: Fixed from version 5.17"
+CVE_STATUS[CVE-2022-50208] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1419] = "fixed-version: Fixed from version 5.6rc2"
+CVE_STATUS[CVE-2022-50209] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1462] = "fixed-version: Fixed from version 5.19rc7"
+CVE_STATUS[CVE-2022-50210] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1508] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-50211] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1516] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50212] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1651] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50213] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1652] = "fixed-version: Fixed from version 5.18rc6"
+CVE_STATUS[CVE-2022-50214] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1671] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50215] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1678] = "fixed-version: Fixed from version 4.20rc1"
+CVE_STATUS[CVE-2022-50217] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1679] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50218] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1729] = "fixed-version: Fixed from version 5.18"
+CVE_STATUS[CVE-2022-50219] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1734] = "fixed-version: Fixed from version 5.18rc6"
+CVE_STATUS[CVE-2022-50220] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1786] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-50221] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1789] = "fixed-version: Fixed from version 5.18"
+CVE_STATUS[CVE-2022-50222] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1836] = "fixed-version: Fixed from version 5.18rc5"
+CVE_STATUS[CVE-2022-50223] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1852] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50224] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1882] = "fixed-version: Fixed from version 5.19rc8"
+CVE_STATUS[CVE-2022-50225] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1943] = "fixed-version: Fixed from version 5.18rc7"
+CVE_STATUS[CVE-2022-50226] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1966] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50227] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1972] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50228] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1973] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50229] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1974] = "fixed-version: Fixed from version 5.18rc6"
+CVE_STATUS[CVE-2022-50230] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1975] = "fixed-version: Fixed from version 5.18rc6"
+CVE_STATUS[CVE-2022-50231] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1976] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50232] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-1998] = "fixed-version: Fixed from version 5.17rc3"
+CVE_STATUS[CVE-2022-50233] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-20008] = "fixed-version: Fixed from version 5.17rc5"
+CVE_STATUS[CVE-2022-50234] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-20132] = "fixed-version: Fixed from version 5.16rc5"
+CVE_STATUS[CVE-2022-50235] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-20141] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-50236] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-20148] = "fixed-version: Fixed from version 5.16rc1"
+CVE_STATUS[CVE-2022-50239] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-20153] = "fixed-version: Fixed from version 5.13rc1"
+CVE_STATUS[CVE-2022-50240] = "fixed-version: Fixed from version 6.0"
-CVE_STATUS[CVE-2022-20154] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-50241] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-20158] = "fixed-version: Fixed from version 5.17"
+CVE_STATUS[CVE-2022-50242] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-20166] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-50243] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-20368] = "fixed-version: Fixed from version 5.17"
+CVE_STATUS[CVE-2022-50244] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-20369] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50245] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-20409] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-50246] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-20421] = "fixed-version: Fixed from version 6.0rc4"
+CVE_STATUS[CVE-2022-50247] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-20422] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50248] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-20423] = "fixed-version: Fixed from version 5.17"
+CVE_STATUS[CVE-2022-50249] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-20424] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-50250] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-20565] = "fixed-version: Fixed from version 5.9rc4"
+CVE_STATUS[CVE-2022-50251] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-20566] = "fixed-version: Fixed from version 5.19"
+CVE_STATUS[CVE-2022-50252] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-20567] = "fixed-version: Fixed from version 4.16rc5"
+CVE_STATUS[CVE-2022-50253] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-20568] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-50254] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-20572] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50255] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-2078] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50256] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-21123] = "fixed-version: Fixed from version 5.19rc3"
+CVE_STATUS[CVE-2022-50257] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-21125] = "fixed-version: Fixed from version 5.19rc3"
+CVE_STATUS[CVE-2022-50258] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2022-21166] = "fixed-version: Fixed from version 5.19rc3"
+CVE_STATUS[CVE-2022-50259] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-21385] = "fixed-version: Fixed from version 4.20"
+CVE_STATUS[CVE-2022-50260] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-21499] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50261] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-21505] = "fixed-version: Fixed from version 5.19rc8"
+CVE_STATUS[CVE-2022-50262] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-2153] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50263] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-2196] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50264] = "fixed-version: Fixed from version 6.2"
-# CVE-2022-2209 has no known resolution
+CVE_STATUS[CVE-2022-50265] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-22942] = "fixed-version: Fixed from version 5.17rc2"
+CVE_STATUS[CVE-2022-50266] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-23036] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50267] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-23037] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50268] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-23038] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50269] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2022-23039] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50270] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-23040] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50271] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-23041] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50272] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-23042] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50273] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-2308] = "fixed-version: Fixed from version 6.0"
+CVE_STATUS[CVE-2022-50274] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-2318] = "fixed-version: Fixed from version 5.19rc5"
+CVE_STATUS[CVE-2022-50275] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-23222] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50276] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-2327] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-50277] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-2380] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50278] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-23816] = "fixed-version: Fixed from version 5.19rc7"
+CVE_STATUS[CVE-2022-50279] = "fixed-version: Fixed from version 6.3"
-# CVE-2022-23825 has no known resolution
+CVE_STATUS[CVE-2022-50280] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-23960] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50281] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-24122] = "fixed-version: Fixed from version 5.17rc2"
+CVE_STATUS[CVE-2022-50282] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-24448] = "fixed-version: Fixed from version 5.17rc2"
+CVE_STATUS[CVE-2022-50283] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-24958] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50284] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-24959] = "fixed-version: Fixed from version 5.17rc2"
+CVE_STATUS[CVE-2022-50285] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-2503] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50286] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-25258] = "fixed-version: Fixed from version 5.17rc4"
+CVE_STATUS[CVE-2022-50287] = "fixed-version: Fixed from version 6.2"
-# CVE-2022-25265 has no known resolution
+CVE_STATUS[CVE-2022-50288] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-25375] = "fixed-version: Fixed from version 5.17rc4"
+CVE_STATUS[CVE-2022-50289] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-25636] = "fixed-version: Fixed from version 5.17rc6"
+CVE_STATUS[CVE-2022-50291] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-2585] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50292] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-2586] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50293] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-2588] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50294] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2022-2590] = "fixed-version: Fixed from version 6.0rc3"
+CVE_STATUS[CVE-2022-50295] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-2602] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50296] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-26365] = "fixed-version: Fixed from version 5.19rc6"
+CVE_STATUS[CVE-2022-50297] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-26373] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50298] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-2639] = "fixed-version: Fixed from version 5.18rc4"
+CVE_STATUS[CVE-2022-50299] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-26490] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50300] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-2663] = "fixed-version: Fixed from version 6.0rc5"
+CVE_STATUS[CVE-2022-50301] = "fixed-version: Fixed from version 6.1"
-# CVE-2022-26878 has no known resolution
+CVE_STATUS[CVE-2022-50302] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-26966] = "fixed-version: Fixed from version 5.17rc6"
+CVE_STATUS[CVE-2022-50303] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-27223] = "fixed-version: Fixed from version 5.17rc6"
+CVE_STATUS[CVE-2022-50304] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-27666] = "fixed-version: Fixed from version 5.17rc8"
+CVE_STATUS[CVE-2022-50305] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-27672] = "fixed-version: Fixed from version 6.2"
+CVE_STATUS[CVE-2022-50306] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-2785] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50307] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-27950] = "fixed-version: Fixed from version 5.17rc5"
+CVE_STATUS[CVE-2022-50308] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-28356] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50309] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-28388] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50310] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-28389] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50311] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-28390] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50312] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-2873] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50313] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-28796] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50314] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-28893] = "fixed-version: Fixed from version 5.18rc2"
+CVE_STATUS[CVE-2022-50315] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-2905] = "fixed-version: Fixed from version 6.0rc4"
+CVE_STATUS[CVE-2022-50316] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-29156] = "fixed-version: Fixed from version 5.17rc6"
+CVE_STATUS[CVE-2022-50317] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-2938] = "fixed-version: Fixed from version 5.17rc2"
+CVE_STATUS[CVE-2022-50318] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-29581] = "fixed-version: Fixed from version 5.18rc4"
+CVE_STATUS[CVE-2022-50319] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-29582] = "fixed-version: Fixed from version 5.18rc2"
+CVE_STATUS[CVE-2022-50320] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-2959] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50321] = "fixed-version: Fixed from version 6.3"
-# CVE-2022-2961 has no known resolution
+CVE_STATUS[CVE-2022-50322] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-2964] = "fixed-version: Fixed from version 5.17rc4"
+CVE_STATUS[CVE-2022-50323] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-2977] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50324] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-2978] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50325] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-29900] = "fixed-version: Fixed from version 5.19rc7"
+CVE_STATUS[CVE-2022-50326] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-29901] = "fixed-version: Fixed from version 5.19rc7"
+CVE_STATUS[CVE-2022-50327] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-2991] = "fixed-version: Fixed from version 5.15rc1"
+CVE_STATUS[CVE-2022-50328] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-29968] = "fixed-version: Fixed from version 5.18rc5"
+CVE_STATUS[CVE-2022-50329] = "fixed-version: Fixed from version 6.1.3"
-CVE_STATUS[CVE-2022-3028] = "fixed-version: Fixed from version 6.0rc3"
+CVE_STATUS[CVE-2022-50330] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-30594] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50331] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3061] = "fixed-version: Fixed from version 5.18rc5"
+CVE_STATUS[CVE-2022-50332] = "fixed-version: Fixed from version 6.0.6"
-CVE_STATUS[CVE-2022-3077] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50333] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3078] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50334] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3103] = "fixed-version: Fixed from version 6.0rc3"
+CVE_STATUS[CVE-2022-50335] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3104] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50336] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3105] = "fixed-version: Fixed from version 5.16"
+CVE_STATUS[CVE-2022-50337] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3106] = "fixed-version: Fixed from version 5.16rc6"
+CVE_STATUS[CVE-2022-50339] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3107] = "fixed-version: Fixed from version 5.17"
+CVE_STATUS[CVE-2022-50340] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3108] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50341] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3110] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50342] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3111] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50343] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3112] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50344] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3113] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50346] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3114] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50347] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3115] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50348] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3169] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50349] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3170] = "fixed-version: Fixed from version 6.0rc4"
+CVE_STATUS[CVE-2022-50350] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3176] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50351] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3202] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50352] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-32250] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50353] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-32296] = "fixed-version: Fixed from version 5.18rc6"
+CVE_STATUS[CVE-2022-50354] = "fixed-version: Fixed from version 6.2"
-# CVE-2022-3238 has no known resolution
+CVE_STATUS[CVE-2022-50355] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3239] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50356] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-32981] = "fixed-version: Fixed from version 5.19rc2"
+CVE_STATUS[CVE-2022-50357] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3303] = "fixed-version: Fixed from version 6.0rc5"
+CVE_STATUS[CVE-2022-50358] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3344] = "fixed-version: Fixed from version 6.1rc7"
+CVE_STATUS[CVE-2022-50359] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-33740] = "fixed-version: Fixed from version 5.19rc6"
+CVE_STATUS[CVE-2022-50360] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-33741] = "fixed-version: Fixed from version 5.19rc6"
+CVE_STATUS[CVE-2022-50361] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2022-33742] = "fixed-version: Fixed from version 5.19rc6"
+CVE_STATUS[CVE-2022-50362] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-33743] = "fixed-version: Fixed from version 5.19rc6"
+CVE_STATUS[CVE-2022-50363] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-33744] = "fixed-version: Fixed from version 5.19rc6"
+CVE_STATUS[CVE-2022-50364] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-33981] = "fixed-version: Fixed from version 5.18rc5"
+CVE_STATUS[CVE-2022-50365] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3424] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50366] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3435] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50367] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-34494] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50368] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-34495] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50369] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2022-34918] = "fixed-version: Fixed from version 5.19rc6"
+CVE_STATUS[CVE-2022-50370] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3521] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50371] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3522] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50372] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3523] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50373] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3524] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50374] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3526] = "fixed-version: Fixed from version 5.18rc3"
+CVE_STATUS[CVE-2022-50375] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3531] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50376] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3532] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50378] = "fixed-version: Fixed from version 6.1"
-# CVE-2022-3533 has no known resolution
+CVE_STATUS[CVE-2022-50379] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3534] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50380] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3535] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50381] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3541] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50382] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3542] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50383] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3543] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50384] = "fixed-version: Fixed from version 6.2"
-# CVE-2022-3544 has no known resolution
+CVE_STATUS[CVE-2022-50385] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3545] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50386] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3564] = "fixed-version: Fixed from version 6.1rc4"
+CVE_STATUS[CVE-2022-50387] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3565] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50388] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3566] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50389] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3567] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50390] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3577] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50391] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3586] = "fixed-version: Fixed from version 6.0rc5"
+CVE_STATUS[CVE-2022-50392] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3594] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50393] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3595] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50394] = "fixed-version: Fixed from version 6.2"
-# CVE-2022-3606 has no known resolution
+CVE_STATUS[CVE-2022-50395] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-36123] = "fixed-version: Fixed from version 5.19rc6"
+CVE_STATUS[CVE-2022-50396] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3619] = "fixed-version: Fixed from version 6.1rc4"
+CVE_STATUS[CVE-2022-50398] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3621] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50399] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3623] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50400] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3624] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50401] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3625] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50402] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3628] = "fixed-version: Fixed from version 6.1rc5"
+CVE_STATUS[CVE-2022-50404] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-36280] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50405] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3629] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50406] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3630] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50407] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3633] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50408] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3635] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50409] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3636] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50410] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3640] = "fixed-version: Fixed from version 6.1rc4"
+CVE_STATUS[CVE-2022-50411] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-36402] = "fixed-version: Fixed from version 6.5"
+CVE_STATUS[CVE-2022-50412] = "fixed-version: Fixed from version 6.1"
-# CVE-2022-3642 has no known resolution
+CVE_STATUS[CVE-2022-50413] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3643] = "fixed-version: Fixed from version 6.1"
+CVE_STATUS[CVE-2022-50414] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3646] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50415] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3649] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50416] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-36879] = "fixed-version: Fixed from version 5.19rc8"
+CVE_STATUS[CVE-2022-50417] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-36946] = "fixed-version: Fixed from version 5.19"
+CVE_STATUS[CVE-2022-50418] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3707] = "fixed-version: Fixed from version 6.2rc3"
+CVE_STATUS[CVE-2022-50419] = "fixed-version: Fixed from version 6.1"
-# CVE-2022-38096 has no known resolution
+CVE_STATUS[CVE-2022-50420] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-38457] = "fixed-version: Fixed from version 6.2rc4"
+CVE_STATUS[CVE-2022-50421] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3903] = "fixed-version: Fixed from version 6.1rc2"
+CVE_STATUS[CVE-2022-50422] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-3910] = "fixed-version: Fixed from version 6.0rc6"
+CVE_STATUS[CVE-2022-50423] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-39188] = "fixed-version: Fixed from version 5.19rc8"
+CVE_STATUS[CVE-2022-50424] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2022-39189] = "fixed-version: Fixed from version 5.19rc2"
+CVE_STATUS[CVE-2022-50425] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-39190] = "fixed-version: Fixed from version 6.0rc3"
+CVE_STATUS[CVE-2022-50426] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-3977] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50427] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-39842] = "fixed-version: Fixed from version 5.19rc4"
+CVE_STATUS[CVE-2022-50428] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-40133] = "fixed-version: Fixed from version 6.2rc4"
+CVE_STATUS[CVE-2022-50429] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-40307] = "fixed-version: Fixed from version 6.0rc5"
+CVE_STATUS[CVE-2022-50430] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-40476] = "fixed-version: Fixed from version 5.19rc4"
+CVE_STATUS[CVE-2022-50431] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-40768] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50432] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-4095] = "fixed-version: Fixed from version 6.0rc4"
+CVE_STATUS[CVE-2022-50433] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-40982] = "fixed-version: Fixed from version 6.5rc6"
+CVE_STATUS[CVE-2022-50434] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-41218] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50435] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-41222] = "fixed-version: Fixed from version 5.14rc1"
+CVE_STATUS[CVE-2022-50436] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-4127] = "fixed-version: Fixed from version 5.19rc6"
+CVE_STATUS[CVE-2022-50437] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-4128] = "fixed-version: Fixed from version 5.19rc7"
+CVE_STATUS[CVE-2022-50438] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-4129] = "fixed-version: Fixed from version 6.1rc6"
+CVE_STATUS[CVE-2022-50439] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-4139] = "fixed-version: Fixed from version 6.1rc8"
+CVE_STATUS[CVE-2022-50440] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-41674] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50441] = "fixed-version: Fixed from version 6.2"
-# CVE-2022-41848 has no known resolution
+CVE_STATUS[CVE-2022-50442] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-41849] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50443] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-41850] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50444] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-41858] = "fixed-version: Fixed from version 5.18rc2"
+CVE_STATUS[CVE-2022-50445] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-42328] = "fixed-version: Fixed from version 6.1"
+CVE_STATUS[CVE-2022-50446] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-42329] = "fixed-version: Fixed from version 6.1"
+CVE_STATUS[CVE-2022-50447] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-42432] = "fixed-version: Fixed from version 6.0rc7"
+CVE_STATUS[CVE-2022-50448] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-4269] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50449] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-42703] = "fixed-version: Fixed from version 6.0rc4"
+CVE_STATUS[CVE-2022-50451] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-42719] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50452] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-42720] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50453] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-42721] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50454] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-42722] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50456] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-42895] = "fixed-version: Fixed from version 6.1rc4"
+CVE_STATUS[CVE-2022-50457] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-42896] = "fixed-version: Fixed from version 6.1rc4"
+CVE_STATUS[CVE-2022-50458] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-43750] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50459] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-4378] = "fixed-version: Fixed from version 6.1"
+CVE_STATUS[CVE-2022-50460] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-4379] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50461] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-4382] = "fixed-version: Fixed from version 6.2rc5"
+CVE_STATUS[CVE-2022-50462] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-43945] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50463] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-44032] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50464] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-44033] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50465] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-44034] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50466] = "fixed-version: Fixed from version 6.1"
-# CVE-2022-4543 has no known resolution
+CVE_STATUS[CVE-2022-50467] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-45869] = "fixed-version: Fixed from version 6.1rc7"
+CVE_STATUS[CVE-2022-50468] = "fixed-version: Fixed from version 6.2"
-# CVE-2022-45884 has no known resolution
+CVE_STATUS[CVE-2022-50469] = "fixed-version: Fixed from version 6.1"
-# CVE-2022-45885 has no known resolution
+CVE_STATUS[CVE-2022-50470] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-45886] = "fixed-version: Fixed from version 6.4rc3"
+CVE_STATUS[CVE-2022-50471] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-45887] = "fixed-version: Fixed from version 6.4rc3"
+CVE_STATUS[CVE-2022-50472] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-45888] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50473] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-45919] = "fixed-version: Fixed from version 6.4rc3"
+CVE_STATUS[CVE-2022-50474] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-45934] = "fixed-version: Fixed from version 6.1"
+CVE_STATUS[CVE-2022-50475] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-4662] = "fixed-version: Fixed from version 6.0rc4"
+CVE_STATUS[CVE-2022-50476] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-4696] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-50477] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-4744] = "fixed-version: Fixed from version 5.16rc7"
+CVE_STATUS[CVE-2022-50478] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-47518] = "fixed-version: Fixed from version 6.1rc8"
+CVE_STATUS[CVE-2022-50479] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-47519] = "fixed-version: Fixed from version 6.1rc8"
+CVE_STATUS[CVE-2022-50480] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-47520] = "fixed-version: Fixed from version 6.1rc8"
+CVE_STATUS[CVE-2022-50481] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-47521] = "fixed-version: Fixed from version 6.1rc8"
+CVE_STATUS[CVE-2022-50482] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-47929] = "fixed-version: Fixed from version 6.2rc4"
+CVE_STATUS[CVE-2022-50483] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-47938] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50484] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-47939] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50485] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-47940] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50486] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-47941] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50488] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-47942] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50489] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-47943] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50490] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-47946] = "fixed-version: Fixed from version 5.12rc2"
+CVE_STATUS[CVE-2022-50491] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-4842] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50492] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-48423] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50493] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-48424] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50494] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-48425] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50496] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-48502] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50497] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-48619] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50498] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-48626] = "fixed-version: Fixed from version 5.17rc4"
+CVE_STATUS[CVE-2022-50499] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-48627] = "fixed-version: Fixed from version 5.19rc7"
+CVE_STATUS[CVE-2022-50500] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2022-48628] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50501] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-48629] = "fixed-version: Fixed from version 5.17"
+CVE_STATUS[CVE-2022-50503] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2022-48630] = "fixed-version: Fixed from version 5.18"
+CVE_STATUS[CVE-2022-50504] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-0030] = "fixed-version: Fixed from version 5.0rc1"
+CVE_STATUS[CVE-2022-50505] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-0045] = "fixed-version: Fixed from version 6.2rc3"
+CVE_STATUS[CVE-2022-50506] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-0047] = "fixed-version: Fixed from version 5.16rc1"
+CVE_STATUS[CVE-2022-50507] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-0122] = "fixed-version: Fixed from version 6.0rc4"
+CVE_STATUS[CVE-2022-50508] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-0160] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50509] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-0179] = "fixed-version: Fixed from version 6.2rc5"
+CVE_STATUS[CVE-2022-50510] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-0210] = "fixed-version: Fixed from version 6.2rc4"
+CVE_STATUS[CVE-2022-50511] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-0240] = "fixed-version: Fixed from version 5.10rc1"
+CVE_STATUS[CVE-2022-50512] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-0266] = "fixed-version: Fixed from version 6.2rc4"
+CVE_STATUS[CVE-2022-50513] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-0386] = "fixed-version: Fixed from version 6.2rc6"
+CVE_STATUS[CVE-2022-50514] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-0394] = "fixed-version: Fixed from version 6.2rc4"
+CVE_STATUS[CVE-2022-50515] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-0458] = "fixed-version: Fixed from version 6.2rc5"
+CVE_STATUS[CVE-2022-50516] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-0459] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50517] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-0461] = "fixed-version: Fixed from version 6.2rc3"
+CVE_STATUS[CVE-2022-50518] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-0468] = "fixed-version: Fixed from version 6.1rc7"
+CVE_STATUS[CVE-2022-50519] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-0469] = "fixed-version: Fixed from version 6.1rc7"
+CVE_STATUS[CVE-2022-50520] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-0590] = "fixed-version: Fixed from version 6.1rc2"
+CVE_STATUS[CVE-2022-50521] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-0597] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50522] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-0615] = "fixed-version: Fixed from version 6.1rc3"
+CVE_STATUS[CVE-2022-50523] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1032] = "fixed-version: Fixed from version 6.3rc2"
+CVE_STATUS[CVE-2022-50524] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1073] = "fixed-version: Fixed from version 6.2rc5"
+CVE_STATUS[CVE-2022-50525] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1074] = "fixed-version: Fixed from version 6.2rc6"
+CVE_STATUS[CVE-2022-50526] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-1075] = "fixed-version: Fixed from version 6.2rc7"
+CVE_STATUS[CVE-2022-50527] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1076] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50528] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1077] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50529] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1078] = "fixed-version: Fixed from version 6.2rc8"
+CVE_STATUS[CVE-2022-50530] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-1079] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50531] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-1095] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50532] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1118] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50533] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1192] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50534] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1193] = "fixed-version: Fixed from version 6.3rc6"
+CVE_STATUS[CVE-2022-50535] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-1194] = "fixed-version: Fixed from version 6.4rc6"
+CVE_STATUS[CVE-2022-50536] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1195] = "fixed-version: Fixed from version 6.1rc3"
+CVE_STATUS[CVE-2022-50537] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1206] = "fixed-version: Fixed from version 6.5rc4"
+CVE_STATUS[CVE-2022-50538] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1249] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50539] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-1252] = "fixed-version: Fixed from version 5.16rc1"
+CVE_STATUS[CVE-2022-50540] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-1281] = "fixed-version: Fixed from version 6.2"
+CVE_STATUS[CVE-2022-50541] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-1295] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-50542] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1380] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50543] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1382] = "fixed-version: Fixed from version 6.1rc7"
+CVE_STATUS[CVE-2022-50544] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-1390] = "fixed-version: Fixed from version 5.11rc4"
+CVE_STATUS[CVE-2022-50545] = "fixed-version: Fixed from version 6.2"
-# CVE-2023-1476 has no known resolution
+CVE_STATUS[CVE-2022-50546] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1513] = "fixed-version: Fixed from version 6.2"
+CVE_STATUS[CVE-2022-50547] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1582] = "fixed-version: Fixed from version 5.17rc4"
+CVE_STATUS[CVE-2022-50548] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1583] = "fixed-version: Fixed from version 6.3rc4"
+CVE_STATUS[CVE-2022-50549] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1611] = "fixed-version: Fixed from version 6.3rc5"
+CVE_STATUS[CVE-2022-50550] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1637] = "fixed-version: Fixed from version 5.18rc2"
+CVE_STATUS[CVE-2022-50551] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1652] = "fixed-version: Fixed from version 6.2rc5"
+CVE_STATUS[CVE-2022-50552] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-1670] = "fixed-version: Fixed from version 6.3rc4"
+CVE_STATUS[CVE-2022-50553] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1829] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50554] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1838] = "fixed-version: Fixed from version 5.18"
+CVE_STATUS[CVE-2022-50555] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-1855] = "fixed-version: Fixed from version 6.3rc3"
+CVE_STATUS[CVE-2022-50556] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-1859] = "fixed-version: Fixed from version 6.3rc7"
+CVE_STATUS[CVE-2022-50557] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1872] = "fixed-version: Fixed from version 5.18rc2"
+CVE_STATUS[CVE-2022-50558] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-1989] = "fixed-version: Fixed from version 6.3rc4"
+CVE_STATUS[CVE-2022-50559] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-1990] = "fixed-version: Fixed from version 6.3rc3"
+CVE_STATUS[CVE-2022-50560] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-1998] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50561] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2002] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50562] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2006] = "fixed-version: Fixed from version 6.1rc7"
+CVE_STATUS[CVE-2022-50563] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2007] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50564] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2008] = "fixed-version: Fixed from version 5.19rc4"
+CVE_STATUS[CVE-2022-50565] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2019] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50566] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-20569] = "fixed-version: Fixed from version 6.5rc6"
+CVE_STATUS[CVE-2022-50567] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-20588] = "fixed-version: Fixed from version 6.5rc6"
+CVE_STATUS[CVE-2022-50568] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-20593] = "fixed-version: Fixed from version 6.5rc4"
+CVE_STATUS[CVE-2022-50569] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-20928] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50570] = "fixed-version: Fixed from version 6.1"
-# CVE-2023-20937 has no known resolution
+CVE_STATUS[CVE-2022-50571] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-20938] = "fixed-version: Fixed from version 5.18rc5"
+CVE_STATUS[CVE-2022-50572] = "fixed-version: Fixed from version 6.2"
-# CVE-2023-20941 has no known resolution
+CVE_STATUS[CVE-2022-50573] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-21102] = "fixed-version: Fixed from version 6.2rc4"
+CVE_STATUS[CVE-2022-50574] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-21106] = "fixed-version: Fixed from version 6.2rc5"
+CVE_STATUS[CVE-2022-50575] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2124] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50576] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-21255] = "fixed-version: Fixed from version 6.4rc4"
+CVE_STATUS[CVE-2022-50577] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-21264] = "fixed-version: Fixed from version 6.4rc5"
+CVE_STATUS[CVE-2022-50578] = "fixed-version: Fixed from version 6.2"
-# CVE-2023-21400 has no known resolution
+CVE_STATUS[CVE-2022-50579] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-2156] = "fixed-version: Fixed from version 6.3"
+CVE_STATUS[CVE-2022-50580] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-2162] = "fixed-version: Fixed from version 6.2rc6"
+CVE_STATUS[CVE-2022-50581] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2163] = "fixed-version: Fixed from version 6.3"
+CVE_STATUS[CVE-2022-50582] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-2166] = "fixed-version: Fixed from version 6.1"
+CVE_STATUS[CVE-2022-50583] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2176] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50614] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-2177] = "fixed-version: Fixed from version 5.19"
+CVE_STATUS[CVE-2022-50615] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2194] = "fixed-version: Fixed from version 6.3rc4"
+CVE_STATUS[CVE-2022-50616] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2235] = "fixed-version: Fixed from version 6.3rc3"
+CVE_STATUS[CVE-2022-50617] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2236] = "fixed-version: Fixed from version 6.1rc7"
+CVE_STATUS[CVE-2022-50618] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2248] = "fixed-version: Fixed from version 6.3"
+CVE_STATUS[CVE-2022-50619] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-2269] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50620] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-22995] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50621] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-22996] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2022-50622] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-22997] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50623] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-22998] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50624] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-22999] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50625] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-23000] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50626] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-23001] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50627] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-23002] = "fixed-version: Fixed from version 5.17rc1"
+CVE_STATUS[CVE-2022-50628] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-23003] = "fixed-version: Fixed from version 5.16rc6"
+CVE_STATUS[CVE-2022-50629] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-23004] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50630] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-23005] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50631] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-23006] = "fixed-version: Fixed from version 5.16rc8"
+CVE_STATUS[CVE-2022-50632] = "fixed-version: Fixed from version 6.2"
-# CVE-2023-23039 has no known resolution
+CVE_STATUS[CVE-2022-50633] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-23454] = "fixed-version: Fixed from version 6.2rc3"
+CVE_STATUS[CVE-2022-50634] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-23455] = "fixed-version: Fixed from version 6.2rc3"
+CVE_STATUS[CVE-2022-50635] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-23559] = "fixed-version: Fixed from version 6.2rc5"
+CVE_STATUS[CVE-2022-50636] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-23586] = "fixed-version: Fixed from version 5.12rc1"
+CVE_STATUS[CVE-2022-50637] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2430] = "fixed-version: Fixed from version 6.2rc5"
+CVE_STATUS[CVE-2022-50638] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2483] = "fixed-version: Fixed from version 6.3rc4"
+CVE_STATUS[CVE-2022-50639] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-25012] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50640] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-2513] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50641] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-25775] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50642] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2598] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50643] = "fixed-version: Fixed from version 6.1"
-# CVE-2023-26242 has no known resolution
+CVE_STATUS[CVE-2022-50644] = "fixed-version: Fixed from version 6.1"
-# CVE-2023-2640 has no known resolution
+CVE_STATUS[CVE-2022-50645] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-26544] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50646] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-26545] = "fixed-version: Fixed from version 6.2"
+CVE_STATUS[CVE-2022-50647] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-26605] = "fixed-version: Fixed from version 6.1rc7"
+CVE_STATUS[CVE-2022-50648] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-26606] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50649] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-26607] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50650] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-28327] = "fixed-version: Fixed from version 6.1"
+CVE_STATUS[CVE-2022-50651] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-28328] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50652] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-28410] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50653] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-28464] = "fixed-version: Fixed from version 6.3rc7"
+CVE_STATUS[CVE-2022-50654] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-28466] = "fixed-version: Fixed from version 6.3rc2"
+CVE_STATUS[CVE-2022-50655] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2860] = "fixed-version: Fixed from version 6.0rc5"
+CVE_STATUS[CVE-2022-50656] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-28746] = "cpe-stable-backport: Backported in 6.6.22"
+CVE_STATUS[CVE-2022-50657] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-28772] = "fixed-version: Fixed from version 5.14rc1"
+CVE_STATUS[CVE-2022-50658] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-28866] = "fixed-version: Fixed from version 6.3rc4"
+CVE_STATUS[CVE-2022-50659] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-2898] = "fixed-version: Fixed from version 6.5rc1"
+CVE_STATUS[CVE-2022-50660] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-2985] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50661] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3006] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50662] = "fixed-version: Fixed from version 6.2"
-# Skipping CVE-2023-3022, no affected_versions
+CVE_STATUS[CVE-2022-50663] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-30456] = "fixed-version: Fixed from version 6.3rc3"
+CVE_STATUS[CVE-2022-50664] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-30772] = "fixed-version: Fixed from version 6.3rc4"
+CVE_STATUS[CVE-2022-50665] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3090] = "fixed-version: Fixed from version 6.4rc2"
+CVE_STATUS[CVE-2022-50666] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3106] = "fixed-version: Fixed from version 4.8rc7"
+CVE_STATUS[CVE-2022-50667] = "fixed-version: Fixed from version 6.1"
-# Skipping CVE-2023-3108, no affected_versions
+CVE_STATUS[CVE-2022-50668] = "fixed-version: Fixed from version 6.2"
-# CVE-2023-31081 has no known resolution
+CVE_STATUS[CVE-2022-50669] = "fixed-version: Fixed from version 6.2"
-# CVE-2023-31082 has no known resolution
+CVE_STATUS[CVE-2022-50670] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-31083] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50671] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-31084] = "fixed-version: Fixed from version 6.4rc3"
+CVE_STATUS[CVE-2022-50672] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-31085] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2022-50673] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3111] = "fixed-version: Fixed from version 6.0rc2"
+CVE_STATUS[CVE-2022-50674] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3117] = "fixed-version: Fixed from version 6.4rc7"
+CVE_STATUS[CVE-2022-50675] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-31248] = "fixed-version: Fixed from version 6.5rc2"
+CVE_STATUS[CVE-2022-50676] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3141] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50677] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-31436] = "fixed-version: Fixed from version 6.3"
+CVE_STATUS[CVE-2022-50678] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3159] = "fixed-version: Fixed from version 5.18rc6"
+CVE_STATUS[CVE-2022-50679] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3161] = "fixed-version: Fixed from version 6.2rc7"
+CVE_STATUS[CVE-2022-50697] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3212] = "fixed-version: Fixed from version 6.4rc2"
+CVE_STATUS[CVE-2022-50698] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3220] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50699] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-32233] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50700] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-32247] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50701] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-32248] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50702] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-32250] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50703] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-32252] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50704] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-32254] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50705] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-32257] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50706] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-32258] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50707] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-32269] = "fixed-version: Fixed from version 6.2rc7"
+CVE_STATUS[CVE-2022-50708] = "fixed-version: Fixed from version 6.1"
-# CVE-2023-32629 has no known resolution
+CVE_STATUS[CVE-2022-50709] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3268] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50710] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3269] = "fixed-version: Fixed from version 6.5rc1"
+CVE_STATUS[CVE-2022-50711] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3312] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50712] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3317] = "fixed-version: Fixed from version 6.3rc6"
+CVE_STATUS[CVE-2022-50713] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-33203] = "fixed-version: Fixed from version 6.3rc4"
+CVE_STATUS[CVE-2022-50714] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-33250] = "fixed-version: Fixed from version 6.5rc1"
+CVE_STATUS[CVE-2022-50715] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-33288] = "fixed-version: Fixed from version 6.3rc4"
+CVE_STATUS[CVE-2022-50716] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3338] = "fixed-version: Fixed from version 6.1rc1"
+CVE_STATUS[CVE-2022-50717] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3355] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50718] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3357] = "fixed-version: Fixed from version 6.2rc1"
+CVE_STATUS[CVE-2022-50719] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3358] = "fixed-version: Fixed from version 6.2rc5"
+CVE_STATUS[CVE-2022-50720] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3359] = "fixed-version: Fixed from version 6.2rc7"
+CVE_STATUS[CVE-2022-50721] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3389] = "fixed-version: Fixed from version 6.0rc1"
+CVE_STATUS[CVE-2022-50722] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3390] = "fixed-version: Fixed from version 6.4rc7"
+CVE_STATUS[CVE-2022-50723] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-33951] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50724] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-33952] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50725] = "fixed-version: Fixed from version 6.2"
-# CVE-2023-3397 has no known resolution
+CVE_STATUS[CVE-2022-50726] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-34255] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50727] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-34256] = "fixed-version: Fixed from version 6.4rc2"
+CVE_STATUS[CVE-2022-50728] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-34319] = "fixed-version: Fixed from version 6.5rc6"
+CVE_STATUS[CVE-2022-50729] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-34324] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2022-50730] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3439] = "fixed-version: Fixed from version 5.18rc5"
+CVE_STATUS[CVE-2022-50731] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-35001] = "fixed-version: Fixed from version 6.5rc2"
+CVE_STATUS[CVE-2022-50732] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3567] = "fixed-version: Fixed from version 6.2rc7"
+CVE_STATUS[CVE-2022-50733] = "fixed-version: Fixed from version 6.1"
-# CVE-2023-35693 has no known resolution
+CVE_STATUS[CVE-2022-50734] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-35788] = "fixed-version: Fixed from version 6.4rc5"
+CVE_STATUS[CVE-2022-50735] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-35823] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50736] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-35824] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50737] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-35826] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50738] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-35827] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2022-50739] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-35828] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50740] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-35829] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2022-50741] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3609] = "fixed-version: Fixed from version 6.4rc7"
+CVE_STATUS[CVE-2022-50742] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3610] = "fixed-version: Fixed from version 6.4"
+CVE_STATUS[CVE-2022-50743] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3611] = "fixed-version: Fixed from version 6.5rc2"
+CVE_STATUS[CVE-2022-50744] = "fixed-version: Fixed from version 6.2"
-# CVE-2023-3640 has no known resolution
+CVE_STATUS[CVE-2022-50745] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-37453] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50746] = "fixed-version: Fixed from version 6.2"
-# CVE-2023-37454 has no known resolution
+CVE_STATUS[CVE-2022-50747] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3772] = "fixed-version: Fixed from version 6.5rc7"
+CVE_STATUS[CVE-2022-50748] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3773] = "fixed-version: Fixed from version 6.5rc7"
+CVE_STATUS[CVE-2022-50749] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3776] = "fixed-version: Fixed from version 6.5rc2"
+CVE_STATUS[CVE-2022-50750] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3777] = "fixed-version: Fixed from version 6.5rc3"
+CVE_STATUS[CVE-2022-50751] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3812] = "fixed-version: Fixed from version 6.1rc4"
+CVE_STATUS[CVE-2022-50752] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-38409] = "fixed-version: Fixed from version 6.3rc7"
+CVE_STATUS[CVE-2022-50753] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-38426] = "fixed-version: Fixed from version 6.4rc3"
+CVE_STATUS[CVE-2022-50754] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-38427] = "fixed-version: Fixed from version 6.4rc6"
+CVE_STATUS[CVE-2022-50755] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-38428] = "fixed-version: Fixed from version 6.4rc3"
+CVE_STATUS[CVE-2022-50756] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-38429] = "fixed-version: Fixed from version 6.4rc3"
+CVE_STATUS[CVE-2022-50757] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-38430] = "fixed-version: Fixed from version 6.4rc6"
+CVE_STATUS[CVE-2022-50758] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-38431] = "fixed-version: Fixed from version 6.4rc6"
+CVE_STATUS[CVE-2022-50759] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-38432] = "fixed-version: Fixed from version 6.4"
+CVE_STATUS[CVE-2022-50760] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3863] = "fixed-version: Fixed from version 6.5rc1"
+CVE_STATUS[CVE-2022-50761] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3865] = "fixed-version: Fixed from version 6.4"
+CVE_STATUS[CVE-2022-50762] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-3866] = "fixed-version: Fixed from version 6.4"
+CVE_STATUS[CVE-2022-50763] = "fixed-version: Fixed from version 6.1"
+
+CVE_STATUS[CVE-2022-50764] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50765] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50766] = "fixed-version: Fixed from version 6.1"
+
+CVE_STATUS[CVE-2022-50767] = "fixed-version: Fixed from version 6.1"
+
+CVE_STATUS[CVE-2022-50768] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50769] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50770] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50771] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50772] = "fixed-version: Fixed from version 6.1"
+
+CVE_STATUS[CVE-2022-50773] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50774] = "fixed-version: Fixed from version 6.1"
+
+CVE_STATUS[CVE-2022-50775] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2022-50776] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50777] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50778] = "fixed-version: Fixed from version 6.1"
+
+CVE_STATUS[CVE-2022-50779] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50780] = "fixed-version: Fixed from version 6.1"
+
+CVE_STATUS[CVE-2022-50781] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50782] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50783] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50784] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50785] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-3867] = "fixed-version: Fixed from version 6.5rc1"
+CVE_STATUS[CVE-2022-50786] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-39189] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50809] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-39191] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50810] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-39192] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50811] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-39193] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50812] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-39194] = "fixed-version: Fixed from version 6.5rc7"
+CVE_STATUS[CVE-2022-50813] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-39197] = "fixed-version: Fixed from version 6.5rc1"
+CVE_STATUS[CVE-2022-50814] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-39198] = "fixed-version: Fixed from version 6.5rc7"
+CVE_STATUS[CVE-2022-50815] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-4004] = "fixed-version: Fixed from version 6.5rc3"
+CVE_STATUS[CVE-2022-50816] = "fixed-version: Fixed from version 6.1"
-# CVE-2023-4010 has no known resolution
+CVE_STATUS[CVE-2022-50817] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-4015] = "fixed-version: Fixed from version 6.5rc4"
+CVE_STATUS[CVE-2022-50818] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-40283] = "fixed-version: Fixed from version 6.5rc1"
+CVE_STATUS[CVE-2022-50819] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-40791] = "fixed-version: Fixed from version 6.5rc6"
+CVE_STATUS[CVE-2022-50820] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4128] = "fixed-version: Fixed from version 6.5rc5"
+CVE_STATUS[CVE-2022-50821] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4132] = "fixed-version: Fixed from version 6.5rc1"
+CVE_STATUS[CVE-2022-50822] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4133] = "fixed-version: Fixed from version 6.3"
+CVE_STATUS[CVE-2022-50823] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-4134] = "fixed-version: Fixed from version 6.5rc1"
+CVE_STATUS[CVE-2022-50824] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4147] = "fixed-version: Fixed from version 6.5rc4"
+CVE_STATUS[CVE-2022-50825] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4155] = "fixed-version: Fixed from version 6.5rc6"
+CVE_STATUS[CVE-2022-50826] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4194] = "fixed-version: Fixed from version 6.5rc5"
+CVE_STATUS[CVE-2022-50827] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-4206] = "fixed-version: Fixed from version 6.5rc5"
+CVE_STATUS[CVE-2022-50828] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-4207] = "fixed-version: Fixed from version 6.5rc5"
+CVE_STATUS[CVE-2022-50829] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4208] = "fixed-version: Fixed from version 6.5rc5"
+CVE_STATUS[CVE-2022-50830] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-4244] = "fixed-version: Fixed from version 6.5rc7"
+CVE_STATUS[CVE-2022-50832] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-4273] = "fixed-version: Fixed from version 6.5rc5"
+CVE_STATUS[CVE-2022-50833] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-42752] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50834] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-42753] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50835] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-42754] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2022-50836] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-42755] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50837] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-42756] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2022-50838] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4385] = "fixed-version: Fixed from version 5.19rc1"
+CVE_STATUS[CVE-2022-50839] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-4387] = "fixed-version: Fixed from version 5.18"
+CVE_STATUS[CVE-2022-50840] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4389] = "fixed-version: Fixed from version 5.18rc3"
+CVE_STATUS[CVE-2022-50841] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4394] = "fixed-version: Fixed from version 6.0rc3"
+CVE_STATUS[CVE-2022-50842] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-44466] = "fixed-version: Fixed from version 6.5rc2"
+CVE_STATUS[CVE-2022-50843] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4459] = "fixed-version: Fixed from version 5.18"
+CVE_STATUS[CVE-2022-50844] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4563] = "fixed-version: Fixed from version 6.5rc6"
+CVE_STATUS[CVE-2022-50845] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4569] = "fixed-version: Fixed from version 6.5rc7"
+CVE_STATUS[CVE-2022-50846] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-45862] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50847] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-45863] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50848] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-45871] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50849] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-45898] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50850] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4610] = "fixed-version: Fixed from version 6.4"
+CVE_STATUS[CVE-2022-50851] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4611] = "fixed-version: Fixed from version 6.5rc4"
+CVE_STATUS[CVE-2022-50852] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-4622] = "fixed-version: Fixed from version 6.5rc1"
+CVE_STATUS[CVE-2022-50853] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4623] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50854] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-46343] = "fixed-version: Fixed from version 6.6rc7"
+CVE_STATUS[CVE-2022-50855] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-46813] = "fixed-version: Fixed from version 6.6rc7"
+CVE_STATUS[CVE-2022-50856] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-46838] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2022-50857] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-46862] = "fixed-version: Fixed from version 6.6"
+CVE_STATUS[CVE-2022-50858] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-47233] = "cpe-stable-backport: Backported in 6.6.24"
+CVE_STATUS[CVE-2022-50859] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-4732] = "fixed-version: Fixed from version 5.14rc1"
+CVE_STATUS[CVE-2022-50860] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4881] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50861] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-4921] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50862] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-50431] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2022-50863] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-5090] = "fixed-version: Fixed from version 6.6rc7"
+CVE_STATUS[CVE-2022-50864] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-51042] = "fixed-version: Fixed from version 6.5rc1"
+CVE_STATUS[CVE-2022-50865] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-51043] = "fixed-version: Fixed from version 6.5rc3"
+CVE_STATUS[CVE-2022-50866] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-5158] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2022-50867] = "fixed-version: Fixed from version 6.1"
-CVE_STATUS[CVE-2023-51779] = "cpe-stable-backport: Backported in 6.6.9"
+CVE_STATUS[CVE-2022-50868] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-5178] = "fixed-version: Fixed from version 6.6rc7"
+CVE_STATUS[CVE-2022-50869] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-51780] = "cpe-stable-backport: Backported in 6.6.8"
+CVE_STATUS[CVE-2022-50870] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-51781] = "cpe-stable-backport: Backported in 6.6.8"
+CVE_STATUS[CVE-2022-50871] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-51782] = "cpe-stable-backport: Backported in 6.6.8"
+CVE_STATUS[CVE-2022-50872] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-5197] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2022-50873] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-52340] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2022-50874] = "fixed-version: Fixed from version 6.3"
-CVE_STATUS[CVE-2023-52429] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2022-50875] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-52433] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2022-50876] = "fixed-version: Fixed from version 6.1"
+
+CVE_STATUS[CVE-2022-50877] = "fixed-version: Fixed from version 6.1"
+
+CVE_STATUS[CVE-2022-50878] = "fixed-version: Fixed from version 6.1"
+
+CVE_STATUS[CVE-2022-50879] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50880] = "fixed-version: Fixed from version 6.1"
+
+CVE_STATUS[CVE-2022-50881] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2022-50882] = "fixed-version: Fixed from version 6.1"
+
+CVE_STATUS[CVE-2022-50883] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50884] = "fixed-version: Fixed from version 6.1"
+
+CVE_STATUS[CVE-2022-50885] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50886] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50887] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50888] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2022-50889] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-32246] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-32249] = "fixed-version: Fixed from version 6.4"
+
+# CVE-2023-34319 has no known resolution
+
+# CVE-2023-34324 has no known resolution
+
+CVE_STATUS[CVE-2023-3865] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-3866] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-3867] = "fixed-version: Fixed from version 6.5"
+
+# CVE-2023-46838 has no known resolution
+
+CVE_STATUS[CVE-2023-4130] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-4515] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-52433] = "fixed-version: Fixed from version 6.6"
CVE_STATUS[CVE-2023-52434] = "cpe-stable-backport: Backported in 6.6.8"
@@ -5734,11 +5826,11 @@ CVE_STATUS[CVE-2023-52438] = "cpe-stable-backport: Backported in 6.6.13"
CVE_STATUS[CVE-2023-52439] = "cpe-stable-backport: Backported in 6.6.13"
-CVE_STATUS[CVE-2023-52440] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2023-52440] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52441] = "fixed-version: Fixed from version 6.5rc4"
+CVE_STATUS[CVE-2023-52441] = "fixed-version: Fixed from version 6.5"
-CVE_STATUS[CVE-2023-52442] = "fixed-version: Fixed from version 6.5rc4"
+CVE_STATUS[CVE-2023-52442] = "fixed-version: Fixed from version 6.5"
CVE_STATUS[CVE-2023-52443] = "cpe-stable-backport: Backported in 6.6.14"
@@ -5774,9 +5866,9 @@ CVE_STATUS[CVE-2023-52458] = "cpe-stable-backport: Backported in 6.6.14"
CVE_STATUS[CVE-2023-52459] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2023-52460] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52460] = "fixed-version: only affects 6.7 onwards"
-CVE_STATUS[CVE-2023-52461] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52461] = "fixed-version: only affects 6.7 onwards"
CVE_STATUS[CVE-2023-52462] = "cpe-stable-backport: Backported in 6.6.14"
@@ -5794,35 +5886,35 @@ CVE_STATUS[CVE-2023-52469] = "cpe-stable-backport: Backported in 6.6.14"
CVE_STATUS[CVE-2023-52470] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2023-52471] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52471] = "fixed-version: only affects 6.7 onwards"
CVE_STATUS[CVE-2023-52472] = "cpe-stable-backport: Backported in 6.6.14"
CVE_STATUS[CVE-2023-52473] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2023-52474] = "fixed-version: Fixed from version 6.4rc1"
+CVE_STATUS[CVE-2023-52474] = "fixed-version: Fixed from version 6.4"
-CVE_STATUS[CVE-2023-52475] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52475] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52476] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52476] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52477] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52477] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52478] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52478] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52479] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52479] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52480] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52480] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52481] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52481] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52482] = "fixed-version: Fixed from version 6.6rc4"
+CVE_STATUS[CVE-2023-52482] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52483] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52483] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52484] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52484] = "fixed-version: Fixed from version 6.6"
-# CVE-2023-52485 needs backporting (fixed from 6.8rc1)
+# CVE-2023-52485 needs backporting (fixed from 6.8)
CVE_STATUS[CVE-2023-52486] = "cpe-stable-backport: Backported in 6.6.15"
@@ -5848,123 +5940,121 @@ CVE_STATUS[CVE-2023-52497] = "cpe-stable-backport: Backported in 6.6.15"
CVE_STATUS[CVE-2023-52498] = "cpe-stable-backport: Backported in 6.6.15"
-CVE_STATUS[CVE-2023-52499] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52499] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52500] = "fixed-version: Fixed from version 6.6rc2"
+CVE_STATUS[CVE-2023-52500] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52501] = "fixed-version: Fixed from version 6.6rc2"
+CVE_STATUS[CVE-2023-52501] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52502] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52502] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52503] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52503] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52504] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52504] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52505] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52505] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52506] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2023-52506] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52507] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52507] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52508] = "fixed-version: Fixed from version 6.6rc2"
+CVE_STATUS[CVE-2023-52508] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52509] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52509] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52510] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52510] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52511] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2023-52511] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52512] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52512] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52513] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52513] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52515] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52515] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52516] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2023-52516] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52517] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2023-52517] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52518] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52518] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52519] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52519] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52520] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52520] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52522] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52522] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52523] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52523] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52524] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52524] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52525] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52525] = "fixed-version: Fixed from version 6.5.7"
-CVE_STATUS[CVE-2023-52526] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52526] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52527] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52527] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52528] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52528] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52529] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52529] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52530] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52530] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52531] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52531] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52532] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52532] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52559] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52559] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52560] = "fixed-version: Fixed from version 6.6rc4"
+CVE_STATUS[CVE-2023-52560] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52561] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2023-52561] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52562] = "fixed-version: Fixed from version 6.6rc4"
+CVE_STATUS[CVE-2023-52562] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52563] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2023-52563] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52564] = "fixed-version: Fixed from version 6.6rc4"
+CVE_STATUS[CVE-2023-52564] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52565] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2023-52565] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52566] = "fixed-version: Fixed from version 6.6rc4"
+CVE_STATUS[CVE-2023-52566] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52567] = "fixed-version: Fixed from version 6.6rc4"
+CVE_STATUS[CVE-2023-52567] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52568] = "fixed-version: Fixed from version 6.6rc4"
+CVE_STATUS[CVE-2023-52568] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52569] = "fixed-version: Fixed from version 6.6rc2"
+CVE_STATUS[CVE-2023-52569] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52570] = "fixed-version: Fixed from version 6.6rc4"
+CVE_STATUS[CVE-2023-52570] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52571] = "fixed-version: Fixed from version 6.6rc4"
+CVE_STATUS[CVE-2023-52571] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52572] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2023-52572] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52573] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2023-52573] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52574] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2023-52574] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52575] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2023-52576] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52576] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2023-52577] = "fixed-version: Fixed from version 6.5.6"
-CVE_STATUS[CVE-2023-52577] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2023-52578] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52578] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2023-52580] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52580] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2023-52581] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52581] = "fixed-version: Fixed from version 6.6rc3"
-
-CVE_STATUS[CVE-2023-52582] = "fixed-version: Fixed from version 6.6rc3"
+CVE_STATUS[CVE-2023-52582] = "fixed-version: Fixed from version 6.6"
CVE_STATUS[CVE-2023-52583] = "cpe-stable-backport: Backported in 6.6.16"
CVE_STATUS[CVE-2023-52584] = "cpe-stable-backport: Backported in 6.6.16"
-# CVE-2023-52585 needs backporting (fixed from 6.8rc1)
+CVE_STATUS[CVE-2023-52585] = "cpe-stable-backport: Backported in 6.6.32"
-# CVE-2023-52586 needs backporting (fixed from 6.8rc1)
+# CVE-2023-52586 needs backporting (fixed from 6.8)
CVE_STATUS[CVE-2023-52587] = "cpe-stable-backport: Backported in 6.6.16"
@@ -5972,7 +6062,7 @@ CVE_STATUS[CVE-2023-52588] = "cpe-stable-backport: Backported in 6.6.16"
CVE_STATUS[CVE-2023-52589] = "cpe-stable-backport: Backported in 6.6.16"
-# CVE-2023-52590 needs backporting (fixed from 6.8rc1)
+# CVE-2023-52590 needs backporting (fixed from 6.8)
CVE_STATUS[CVE-2023-52591] = "cpe-stable-backport: Backported in 6.6.16"
@@ -6036,19 +6126,17 @@ CVE_STATUS[CVE-2023-52622] = "cpe-stable-backport: Backported in 6.6.16"
CVE_STATUS[CVE-2023-52623] = "cpe-stable-backport: Backported in 6.6.16"
-# CVE-2023-52624 needs backporting (fixed from 6.8rc1)
+# CVE-2023-52624 needs backporting (fixed from 6.8)
-# CVE-2023-52625 needs backporting (fixed from 6.8rc1)
+# CVE-2023-52625 needs backporting (fixed from 6.8)
-CVE_STATUS[CVE-2023-52626] = "fixed-version: only affects 6.7rc2 onwards"
+CVE_STATUS[CVE-2023-52626] = "cpe-stable-backport: Backported in 6.6.15"
CVE_STATUS[CVE-2023-52627] = "cpe-stable-backport: Backported in 6.6.15"
-CVE_STATUS[CVE-2023-52628] = "fixed-version: Fixed from version 6.6rc1"
-
-CVE_STATUS[CVE-2023-52629] = "fixed-version: Fixed from version 6.6rc1"
+CVE_STATUS[CVE-2023-52628] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2023-52630] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52629] = "fixed-version: Fixed from version 6.6"
CVE_STATUS[CVE-2023-52631] = "cpe-stable-backport: Backported in 6.6.17"
@@ -6056,7 +6144,7 @@ CVE_STATUS[CVE-2023-52632] = "cpe-stable-backport: Backported in 6.6.16"
CVE_STATUS[CVE-2023-52633] = "cpe-stable-backport: Backported in 6.6.16"
-# CVE-2023-52634 needs backporting (fixed from 6.8rc1)
+CVE_STATUS[CVE-2023-52634] = "fixed-version: only affects 6.7 onwards"
CVE_STATUS[CVE-2023-52635] = "cpe-stable-backport: Backported in 6.6.16"
@@ -6072,589 +6160,15159 @@ CVE_STATUS[CVE-2023-52640] = "cpe-stable-backport: Backported in 6.6.19"
CVE_STATUS[CVE-2023-52641] = "cpe-stable-backport: Backported in 6.6.19"
-CVE_STATUS[CVE-2023-5345] = "fixed-version: Fixed from version 6.6rc4"
+CVE_STATUS[CVE-2023-52642] = "cpe-stable-backport: Backported in 6.6.18"
-CVE_STATUS[CVE-2023-5633] = "fixed-version: Fixed from version 6.6rc6"
+CVE_STATUS[CVE-2023-52643] = "cpe-stable-backport: Backported in 6.6.18"
-CVE_STATUS[CVE-2023-5717] = "fixed-version: Fixed from version 6.6rc7"
+CVE_STATUS[CVE-2023-52644] = "cpe-stable-backport: Backported in 6.6.23"
-CVE_STATUS[CVE-2023-5972] = "fixed-version: Fixed from version 6.6rc7"
+CVE_STATUS[CVE-2023-52645] = "cpe-stable-backport: Backported in 6.6.18"
-CVE_STATUS[CVE-2023-6039] = "fixed-version: Fixed from version 6.5rc5"
+CVE_STATUS[CVE-2023-52646] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2023-6040] = "fixed-version: Fixed from version 5.18rc1"
+CVE_STATUS[CVE-2023-52647] = "cpe-stable-backport: Backported in 6.6.24"
-CVE_STATUS[CVE-2023-6111] = "cpe-stable-backport: Backported in 6.6.3"
+CVE_STATUS[CVE-2023-52648] = "cpe-stable-backport: Backported in 6.6.24"
-CVE_STATUS[CVE-2023-6121] = "cpe-stable-backport: Backported in 6.6.4"
+CVE_STATUS[CVE-2023-52649] = "cpe-stable-backport: Backported in 6.6.23"
-CVE_STATUS[CVE-2023-6176] = "fixed-version: Fixed from version 6.6rc2"
+CVE_STATUS[CVE-2023-52650] = "cpe-stable-backport: Backported in 6.6.23"
-CVE_STATUS[CVE-2023-6200] = "cpe-stable-backport: Backported in 6.6.9"
+CVE_STATUS[CVE-2023-52652] = "cpe-stable-backport: Backported in 6.6.23"
-# CVE-2023-6238 has no known resolution
+CVE_STATUS[CVE-2023-52653] = "cpe-stable-backport: Backported in 6.6.23"
-# CVE-2023-6240 has no known resolution
+CVE_STATUS[CVE-2023-52654] = "cpe-stable-backport: Backported in 6.6.7"
-CVE_STATUS[CVE-2023-6270] = "cpe-stable-backport: Backported in 6.6.23"
+CVE_STATUS[CVE-2023-52655] = "cpe-stable-backport: Backported in 6.6.8"
-CVE_STATUS[CVE-2023-6356] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52656] = "cpe-stable-backport: Backported in 6.6.23"
-CVE_STATUS[CVE-2023-6531] = "cpe-stable-backport: Backported in 6.6.7"
+CVE_STATUS[CVE-2023-52657] = "cpe-stable-backport: Backported in 6.6.21"
-# CVE-2023-6535 has no known resolution
+CVE_STATUS[CVE-2023-52658] = "cpe-stable-backport: Backported in 6.6.22"
-CVE_STATUS[CVE-2023-6536] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52659] = "cpe-stable-backport: Backported in 6.6.23"
-CVE_STATUS[CVE-2023-6546] = "fixed-version: Fixed from version 6.5rc7"
+CVE_STATUS[CVE-2023-52660] = "cpe-stable-backport: Backported in 6.6.23"
-CVE_STATUS[CVE-2023-6560] = "cpe-stable-backport: Backported in 6.6.5"
+CVE_STATUS[CVE-2023-52661] = "cpe-stable-backport: Backported in 6.6.23"
-CVE_STATUS[CVE-2023-6606] = "cpe-stable-backport: Backported in 6.6.9"
+CVE_STATUS[CVE-2023-52662] = "cpe-stable-backport: Backported in 6.6.23"
-CVE_STATUS[CVE-2023-6610] = "cpe-stable-backport: Backported in 6.6.13"
+CVE_STATUS[CVE-2023-52663] = "cpe-stable-backport: Backported in 6.6.23"
-CVE_STATUS[CVE-2023-6622] = "cpe-stable-backport: Backported in 6.6.7"
+CVE_STATUS[CVE-2023-52664] = "cpe-stable-backport: Backported in 6.6.16"
-CVE_STATUS[CVE-2023-6679] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52667] = "cpe-stable-backport: Backported in 6.6.15"
-CVE_STATUS[CVE-2023-6817] = "cpe-stable-backport: Backported in 6.6.7"
+CVE_STATUS[CVE-2023-52668] = "cpe-stable-backport: Backported in 6.6.15"
-CVE_STATUS[CVE-2023-6915] = "cpe-stable-backport: Backported in 6.6.13"
+CVE_STATUS[CVE-2023-52669] = "cpe-stable-backport: Backported in 6.6.15"
-CVE_STATUS[CVE-2023-6931] = "cpe-stable-backport: Backported in 6.6.7"
+CVE_STATUS[CVE-2023-52670] = "cpe-stable-backport: Backported in 6.6.15"
-CVE_STATUS[CVE-2023-6932] = "cpe-stable-backport: Backported in 6.6.5"
+CVE_STATUS[CVE-2023-52671] = "cpe-stable-backport: Backported in 6.6.24"
-CVE_STATUS[CVE-2023-7042] = "cpe-stable-backport: Backported in 6.6.23"
+CVE_STATUS[CVE-2023-52672] = "cpe-stable-backport: Backported in 6.6.15"
-CVE_STATUS[CVE-2023-7192] = "fixed-version: Fixed from version 6.3rc1"
+CVE_STATUS[CVE-2023-52673] = "fixed-version: only affects 6.7 onwards"
-CVE_STATUS[CVE-2024-0193] = "cpe-stable-backport: Backported in 6.6.10"
+CVE_STATUS[CVE-2023-52674] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-0340] = "fixed-version: Fixed from version 6.4rc6"
+CVE_STATUS[CVE-2023-52675] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-0443] = "fixed-version: Fixed from version 6.4rc7"
+CVE_STATUS[CVE-2023-52676] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-0562] = "fixed-version: Fixed from version 6.0rc3"
+CVE_STATUS[CVE-2023-52677] = "cpe-stable-backport: Backported in 6.6.14"
-# CVE-2024-0564 has no known resolution
+CVE_STATUS[CVE-2023-52678] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-0565] = "cpe-stable-backport: Backported in 6.6.8"
+CVE_STATUS[CVE-2023-52679] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-0582] = "cpe-stable-backport: Backported in 6.6.5"
+CVE_STATUS[CVE-2023-52680] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-0584] = "cpe-stable-backport: Backported in 6.6.5"
+CVE_STATUS[CVE-2023-52681] = "fixed-version: only affects 6.7 onwards"
-CVE_STATUS[CVE-2024-0607] = "cpe-stable-backport: Backported in 6.6.3"
+CVE_STATUS[CVE-2023-52682] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-0639] = "fixed-version: Fixed from version 6.5rc1"
+CVE_STATUS[CVE-2023-52683] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-0641] = "fixed-version: Fixed from version 6.6rc5"
+CVE_STATUS[CVE-2023-52684] = "fixed-version: only affects 6.7 onwards"
-CVE_STATUS[CVE-2024-0646] = "cpe-stable-backport: Backported in 6.6.7"
+CVE_STATUS[CVE-2023-52686] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-0775] = "fixed-version: Fixed from version 6.4rc2"
+CVE_STATUS[CVE-2023-52687] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-0841] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52688] = "fixed-version: only affects 6.7 onwards"
-CVE_STATUS[CVE-2024-1085] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52689] = "fixed-version: only affects 6.7 onwards"
-CVE_STATUS[CVE-2024-1086] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52690] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-1151] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52691] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-1312] = "fixed-version: Fixed from version 6.5rc4"
+CVE_STATUS[CVE-2023-52692] = "cpe-stable-backport: Backported in 6.6.14"
-# CVE-2024-21803 has no known resolution
+CVE_STATUS[CVE-2023-52693] = "cpe-stable-backport: Backported in 6.6.14"
-# CVE-2024-2193 has no known resolution
+CVE_STATUS[CVE-2023-52694] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-22099] = "cpe-stable-backport: Backported in 6.6.23"
+CVE_STATUS[CVE-2023-52695] = "fixed-version: only affects 6.7 onwards"
-# CVE-2024-22386 has no known resolution
+CVE_STATUS[CVE-2023-52696] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-22705] = "cpe-stable-backport: Backported in 6.6.10"
+CVE_STATUS[CVE-2023-52697] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-23196] = "fixed-version: Fixed from version 6.5rc1"
+CVE_STATUS[CVE-2023-52698] = "cpe-stable-backport: Backported in 6.6.14"
-CVE_STATUS[CVE-2024-23307] = "cpe-stable-backport: Backported in 6.6.24"
+CVE_STATUS[CVE-2023-52699] = "cpe-stable-backport: Backported in 6.6.27"
-# CVE-2024-23848 has no known resolution
+CVE_STATUS[CVE-2023-52700] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-23849] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52701] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-23850] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52702] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-23851] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52703] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-24855] = "fixed-version: Fixed from version 6.5rc2"
+CVE_STATUS[CVE-2023-52704] = "fixed-version: Fixed from version 6.2"
-# CVE-2024-24857 has no known resolution
+CVE_STATUS[CVE-2023-52705] = "fixed-version: Fixed from version 6.2"
-# CVE-2024-24858 has no known resolution
+CVE_STATUS[CVE-2023-52706] = "fixed-version: Fixed from version 6.2"
-# CVE-2024-24859 has no known resolution
+CVE_STATUS[CVE-2023-52707] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-24860] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52708] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-24861] = "cpe-stable-backport: Backported in 6.6.24"
+CVE_STATUS[CVE-2023-52730] = "fixed-version: Fixed from version 6.2"
-# CVE-2024-24864 has no known resolution
+CVE_STATUS[CVE-2023-52731] = "fixed-version: Fixed from version 6.2"
-# CVE-2024-25739 has no known resolution
+CVE_STATUS[CVE-2023-52732] = "fixed-version: Fixed from version 6.2"
-# CVE-2024-25740 has no known resolution
+CVE_STATUS[CVE-2023-52735] = "fixed-version: Fixed from version 6.2"
-# CVE-2024-25741 has no known resolution
+CVE_STATUS[CVE-2023-52736] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-25744] = "cpe-stable-backport: Backported in 6.6.7"
+CVE_STATUS[CVE-2023-52737] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26581] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52738] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26582] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52739] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26583] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52740] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26584] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52741] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26585] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52742] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26586] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52743] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26587] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52744] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26588] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52745] = "fixed-version: Fixed from version 6.1.12"
-CVE_STATUS[CVE-2024-26589] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52746] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26590] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52747] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26591] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52748] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26592] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52749] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26593] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52750] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26594] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52751] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26595] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52752] = "cpe-stable-backport: Backported in 6.6.3"
-# CVE-2024-26596 needs backporting (fixed from 6.8rc1)
+CVE_STATUS[CVE-2023-52753] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26597] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52754] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26598] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52755] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26599] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52757] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26600] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52760] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26601] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52761] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26602] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52762] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26603] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52763] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26604] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52764] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26605] = "fixed-version: only affects 6.7 onwards"
+CVE_STATUS[CVE-2023-52765] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26606] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52766] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26607] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52767] = "cpe-stable-backport: Backported in 6.6.4"
-CVE_STATUS[CVE-2024-26608] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52768] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26610] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52769] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26611] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52770] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26612] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52771] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26614] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52772] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26615] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52773] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26616] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52774] = "cpe-stable-backport: Backported in 6.6.4"
-CVE_STATUS[CVE-2024-26617] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52775] = "cpe-stable-backport: Backported in 6.6.4"
-CVE_STATUS[CVE-2024-26618] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52776] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26619] = "fixed-version: only affects 6.7rc5 onwards"
+CVE_STATUS[CVE-2023-52777] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26620] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52778] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26621] = "fixed-version: only affects 6.7 onwards"
+CVE_STATUS[CVE-2023-52779] = "cpe-stable-backport: Backported in 6.6.4"
-CVE_STATUS[CVE-2024-26622] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52780] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26623] = "cpe-stable-backport: Backported in 6.6.16"
+CVE_STATUS[CVE-2023-52781] = "cpe-stable-backport: Backported in 6.6.4"
-CVE_STATUS[CVE-2024-26625] = "cpe-stable-backport: Backported in 6.6.16"
+CVE_STATUS[CVE-2023-52782] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26626] = "fixed-version: only affects 6.8rc1 onwards"
+CVE_STATUS[CVE-2023-52783] = "cpe-stable-backport: Backported in 6.6.4"
-CVE_STATUS[CVE-2024-26627] = "cpe-stable-backport: Backported in 6.6.16"
+CVE_STATUS[CVE-2023-52784] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26629] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52785] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26630] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52786] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26631] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52787] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26632] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52788] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26633] = "cpe-stable-backport: Backported in 6.6.14"
+CVE_STATUS[CVE-2023-52789] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26634] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52790] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26635] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52791] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26636] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52792] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26637] = "fixed-version: only affects 6.7 onwards"
+CVE_STATUS[CVE-2023-52794] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26638] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52795] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26639] = "fixed-version: only affects 6.8rc1 onwards"
+CVE_STATUS[CVE-2023-52796] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26640] = "cpe-stable-backport: Backported in 6.6.16"
+CVE_STATUS[CVE-2023-52797] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26641] = "cpe-stable-backport: Backported in 6.6.16"
+CVE_STATUS[CVE-2023-52798] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26642] = "cpe-stable-backport: Backported in 6.6.24"
+CVE_STATUS[CVE-2023-52799] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26643] = "cpe-stable-backport: Backported in 6.6.24"
+CVE_STATUS[CVE-2023-52800] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26644] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52801] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26645] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52803] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26646] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52804] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26647] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52805] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26648] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52806] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26649] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52807] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26650] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52808] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26651] = "cpe-stable-backport: Backported in 6.6.23"
+CVE_STATUS[CVE-2023-52809] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26652] = "cpe-stable-backport: Backported in 6.6.22"
+CVE_STATUS[CVE-2023-52810] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26653] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52811] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26654] = "cpe-stable-backport: Backported in 6.6.24"
+CVE_STATUS[CVE-2023-52812] = "cpe-stable-backport: Backported in 6.6.3"
-# CVE-2024-26655 needs backporting (fixed from 6.9rc2)
+CVE_STATUS[CVE-2023-52813] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26656] = "cpe-stable-backport: Backported in 6.6.24"
+CVE_STATUS[CVE-2023-52814] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26657] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52815] = "cpe-stable-backport: Backported in 6.6.3"
-# CVE-2024-26658 needs backporting (fixed from 6.8rc1)
+CVE_STATUS[CVE-2023-52816] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26659] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52817] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26660] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52818] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26661] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52819] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26662] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52821] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26663] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52825] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26664] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52826] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26665] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52827] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26666] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52828] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26667] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52829] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26668] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52831] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26669] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52832] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26670] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-52833] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26671] = "cpe-stable-backport: Backported in 6.6.16"
+CVE_STATUS[CVE-2023-52834] = "cpe-stable-backport: Backported in 6.6.3"
-# CVE-2024-26672 needs backporting (fixed from 6.8rc1)
+CVE_STATUS[CVE-2023-52835] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26673] = "cpe-stable-backport: Backported in 6.6.16"
+CVE_STATUS[CVE-2023-52836] = "cpe-stable-backport: Backported in 6.6.3"
-CVE_STATUS[CVE-2024-26674] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52837] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26675] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52838] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26676] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52839] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26677] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52840] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26678] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52841] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26679] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52842] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26680] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52843] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26681] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52844] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26682] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52845] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26683] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52846] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26684] = "cpe-stable-backport: Backported in 6.6.17"
+CVE_STATUS[CVE-2023-52847] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26685] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52848] = "cpe-stable-backport: Backported in 6.6.2"
-# CVE-2024-26686 needs backporting (fixed from 6.8rc4)
+CVE_STATUS[CVE-2023-52849] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26687] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52850] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26688] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52851] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26689] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52852] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26690] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52853] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26691] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52854] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26692] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52855] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26693] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52856] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26694] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52857] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26695] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52858] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26696] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52859] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26697] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52860] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26698] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52861] = "cpe-stable-backport: Backported in 6.6.2"
-# CVE-2024-26699 needs backporting (fixed from 6.8rc5)
+CVE_STATUS[CVE-2023-52862] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26700] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52863] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26702] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52864] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26703] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52865] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26704] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52866] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26705] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52867] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26706] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52868] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26707] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52869] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26708] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52870] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26709] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52871] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26710] = "fixed-version: only affects 6.8rc1 onwards"
+CVE_STATUS[CVE-2023-52872] = "cpe-stable-backport: Backported in 6.6.1"
-CVE_STATUS[CVE-2024-26711] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52873] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26712] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52874] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26713] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52875] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26714] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52876] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26715] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52877] = "cpe-stable-backport: Backported in 6.6.1"
-CVE_STATUS[CVE-2024-26716] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52878] = "cpe-stable-backport: Backported in 6.6.2"
-CVE_STATUS[CVE-2024-26717] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52879] = "cpe-stable-backport: Backported in 6.6.1"
-CVE_STATUS[CVE-2024-26718] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52880] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2024-26719] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52881] = "cpe-stable-backport: Backported in 6.6.7"
-CVE_STATUS[CVE-2024-26720] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52882] = "cpe-stable-backport: Backported in 6.6.31"
-CVE_STATUS[CVE-2024-26721] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52883] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2024-26722] = "fixed-version: only affects 6.7rc5 onwards"
+CVE_STATUS[CVE-2023-52884] = "cpe-stable-backport: Backported in 6.6.33"
-CVE_STATUS[CVE-2024-26723] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52885] = "fixed-version: Fixed from version 6.5"
-CVE_STATUS[CVE-2024-26724] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52886] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2024-26725] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52887] = "cpe-stable-backport: Backported in 6.6.37"
-CVE_STATUS[CVE-2024-26726] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52888] = "cpe-stable-backport: Backported in 6.6.39"
-CVE_STATUS[CVE-2024-26727] = "cpe-stable-backport: Backported in 6.6.18"
+CVE_STATUS[CVE-2023-52889] = "cpe-stable-backport: Backported in 6.6.44"
-CVE_STATUS[CVE-2024-26728] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52893] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26729] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52894] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26730] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52895] = "fixed-version: Fixed from version 6.1.8"
-CVE_STATUS[CVE-2024-26731] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52896] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26732] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52897] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26733] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52898] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26734] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52899] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26735] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52900] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26736] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52901] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26737] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52902] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26738] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52903] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26739] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52904] = "fixed-version: Fixed from version 5.15.168"
-CVE_STATUS[CVE-2024-26740] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52905] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26741] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52906] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26742] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52907] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26743] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52908] = "fixed-version: Fixed from version 6.1.7"
-CVE_STATUS[CVE-2024-26744] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52909] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26745] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52910] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26746] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52911] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26747] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52912] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26748] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52913] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26749] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52914] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26750] = "fixed-version: only affects 6.8rc5 onwards"
+CVE_STATUS[CVE-2023-52915] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2024-26751] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52916] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2024-26752] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52918] = "cpe-stable-backport: Backported in 6.6.48"
-CVE_STATUS[CVE-2024-26753] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52919] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2024-26754] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52920] = "cpe-stable-backport: Backported in 6.6.70"
-CVE_STATUS[CVE-2024-26755] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52921] = "fixed-version: Fixed from version 6.5"
-# CVE-2024-26756 needs backporting (fixed from 6.8rc6)
+CVE_STATUS[CVE-2023-52922] = "fixed-version: Fixed from version 6.5"
-# CVE-2024-26757 needs backporting (fixed from 6.8rc6)
+CVE_STATUS[CVE-2023-52923] = "fixed-version: Fixed from version 6.5"
-# CVE-2024-26758 needs backporting (fixed from 6.8rc6)
+CVE_STATUS[CVE-2023-52924] = "fixed-version: Fixed from version 6.5"
-CVE_STATUS[CVE-2024-26759] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52925] = "fixed-version: Fixed from version 6.4.12"
-CVE_STATUS[CVE-2024-26760] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52926] = "cpe-stable-backport: Backported in 6.6.68"
-CVE_STATUS[CVE-2024-26761] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52927] = "fixed-version: Fixed from version 6.6"
-CVE_STATUS[CVE-2024-26762] = "fixed-version: only affects 6.7rc1 onwards"
+CVE_STATUS[CVE-2023-52928] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26763] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52929] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26764] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52930] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26765] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52931] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26766] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52932] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26767] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52933] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26768] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52934] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26769] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52935] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26770] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52936] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26771] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52937] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26772] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52938] = "fixed-version: Fixed from version 6.1.11"
-CVE_STATUS[CVE-2024-26773] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52939] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26774] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52940] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26775] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52941] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26776] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52942] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26777] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52973] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26778] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52974] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26779] = "cpe-stable-backport: Backported in 6.6.19"
+CVE_STATUS[CVE-2023-52975] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26780] = "fixed-version: only affects 6.8rc4 onwards"
+CVE_STATUS[CVE-2023-52976] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26781] = "fixed-version: only affects 6.8rc6 onwards"
+CVE_STATUS[CVE-2023-52977] = "fixed-version: Fixed from version 6.1.11"
-CVE_STATUS[CVE-2024-26782] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52978] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26783] = "cpe-stable-backport: Backported in 6.6.22"
+CVE_STATUS[CVE-2023-52980] = "fixed-version: Fixed from version 6.2"
-# CVE-2024-26784 needs backporting (fixed from 6.8rc7)
+CVE_STATUS[CVE-2023-52981] = "fixed-version: Fixed from version 6.2"
-# CVE-2024-26785 needs backporting (fixed from 6.8rc7)
+CVE_STATUS[CVE-2023-52982] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26786] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52983] = "fixed-version: Fixed from version 6.1.11"
-CVE_STATUS[CVE-2024-26787] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52984] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26788] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52985] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26789] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52986] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26790] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52987] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26791] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52988] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26792] = "fixed-version: only affects 6.8rc4 onwards"
+CVE_STATUS[CVE-2023-52989] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26793] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52991] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26794] = "fixed-version: only affects 6.8rc6 onwards"
+CVE_STATUS[CVE-2023-52992] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26795] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52993] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26796] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52994] = "fixed-version: Fixed from version 6.1.9"
-# CVE-2024-26797 needs backporting (fixed from 6.8rc7)
+CVE_STATUS[CVE-2023-52995] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26798] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52996] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26799] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52997] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26800] = "fixed-version: only affects 6.8rc5 onwards"
+CVE_STATUS[CVE-2023-52998] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26801] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-52999] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26802] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-53000] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26803] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-53002] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26804] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-53003] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26805] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-53004] = "fixed-version: Fixed from version 6.2"
-# CVE-2024-26806 needs backporting (fixed from 6.8rc7)
+CVE_STATUS[CVE-2023-53005] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26807] = "cpe-stable-backport: Backported in 6.6.21"
+CVE_STATUS[CVE-2023-53006] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26808] = "cpe-stable-backport: Backported in 6.6.15"
+CVE_STATUS[CVE-2023-53007] = "fixed-version: Fixed from version 6.2"
-CVE_STATUS[CVE-2024-26809] = "cpe-stable-backport: Backported in 6.6.23"
+CVE_STATUS[CVE-2023-53008] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53009] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53010] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53011] = "fixed-version: Fixed from version 6.2"
+
+# CVE-2023-53012 has no known resolution
+
+CVE_STATUS[CVE-2023-53013] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53014] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53015] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53016] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53017] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53018] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53019] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53020] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53021] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53022] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53023] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53024] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53026] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53028] = "fixed-version: Fixed from version 6.1.8"
+
+CVE_STATUS[CVE-2023-53029] = "fixed-version: Fixed from version 6.1.8"
+
+CVE_STATUS[CVE-2023-53030] = "fixed-version: Fixed from version 6.1.8"
+
+CVE_STATUS[CVE-2023-53031] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53032] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53033] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53034] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2023-53035] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53036] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53037] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53038] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53039] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53040] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53041] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53042] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53043] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53044] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53045] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53046] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53047] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53048] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53049] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53050] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53051] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53052] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53053] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53054] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53055] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53056] = "fixed-version: Fixed from version 6.2.9"
+
+CVE_STATUS[CVE-2023-53057] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53058] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53059] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53060] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53061] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53062] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53064] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53065] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53066] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53067] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53068] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53069] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53070] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53071] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53072] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53073] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53074] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53075] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53077] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53078] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53079] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53080] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53081] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53082] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53083] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53084] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53085] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53086] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53087] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53088] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53089] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53090] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53091] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53092] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53093] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53094] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53095] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53096] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53097] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53098] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53099] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53100] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53101] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53102] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53103] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53105] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53106] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53107] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53108] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53109] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53110] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53111] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53112] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53113] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53114] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53115] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53116] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53117] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53118] = "fixed-version: Fixed from version 6.2.8"
+
+CVE_STATUS[CVE-2023-53119] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53120] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53121] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53123] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53124] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53125] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53126] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53127] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53128] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53131] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53132] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53133] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53134] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53135] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53136] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53138] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53139] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53140] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53141] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53142] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53143] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53144] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53145] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53146] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53147] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53148] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53149] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53150] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53151] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53152] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53153] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53163] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53164] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53165] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53166] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53167] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53168] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53169] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53170] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53171] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53172] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53173] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53174] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53175] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53176] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53177] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53178] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53179] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53180] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53181] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53182] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53184] = "fixed-version: Fixed from version 6.4.8"
+
+CVE_STATUS[CVE-2023-53185] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53186] = "fixed-version: Fixed from version 6.3"
+
+# CVE-2023-53187 has no known resolution
+
+CVE_STATUS[CVE-2023-53188] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53189] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53190] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53191] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53192] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53193] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53194] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53195] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53196] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53197] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53198] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53199] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53200] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53201] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53202] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53203] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53204] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53205] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53206] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53207] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53208] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53209] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53210] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53211] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53213] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53214] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53215] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53216] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53217] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53218] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53219] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53220] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53221] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53222] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53223] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53224] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53225] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53226] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53228] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53229] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53230] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53231] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53232] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53233] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53234] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53235] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53236] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53237] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53238] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53239] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53240] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53241] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53242] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53243] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53244] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53245] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53246] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53247] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53248] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53249] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53250] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53251] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53252] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53253] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53254] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53255] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53256] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53257] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53258] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53259] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53260] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53261] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53262] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53263] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53264] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53265] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53266] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53267] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53268] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53269] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53270] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53271] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53272] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53273] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53274] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53275] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53276] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53277] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53278] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53279] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53280] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53281] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53282] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53284] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53285] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53286] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53287] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53288] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53289] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53290] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53291] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53292] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53294] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53295] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53296] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53297] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53298] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53299] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53300] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53301] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53302] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53303] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53304] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53305] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53306] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53307] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53308] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53309] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53310] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53311] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53312] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53313] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53314] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53315] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53316] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53317] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53318] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53319] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53320] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53321] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53322] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53323] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53324] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53325] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53326] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53327] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53328] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53329] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53330] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53331] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53332] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53333] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53334] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53335] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53336] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53337] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53338] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53339] = "fixed-version: Fixed from version 6.4.12"
+
+CVE_STATUS[CVE-2023-53340] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53341] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53342] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53343] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53344] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53345] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53346] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53347] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53348] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53349] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53350] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53351] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53352] = "fixed-version: Fixed from version 6.4.10"
+
+CVE_STATUS[CVE-2023-53353] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53354] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53355] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53356] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53357] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53358] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53359] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53360] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53361] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53362] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53363] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53364] = "fixed-version: Fixed from version 6.4.12"
+
+CVE_STATUS[CVE-2023-53365] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53366] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53367] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53368] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53369] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53370] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53371] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53372] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53373] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53374] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53375] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53376] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53377] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53378] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53379] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53380] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53381] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53382] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53383] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53384] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53385] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53386] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53387] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53388] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53389] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53390] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53391] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53392] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53393] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53394] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53395] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53396] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53397] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53398] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53399] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53400] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53401] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53402] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53403] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53404] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53405] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53406] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53407] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53408] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53409] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53410] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53411] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53412] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53413] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53414] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53415] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53416] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53417] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53418] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53419] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53420] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53421] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53422] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53423] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53424] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53425] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53426] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53427] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53428] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53429] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53430] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53431] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53432] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53433] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53434] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53435] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53436] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53437] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53438] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53439] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53440] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53441] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53442] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53443] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53444] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53445] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53446] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53447] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53448] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53449] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53450] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53451] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53452] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53453] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53454] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53455] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53456] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53457] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53458] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53459] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53460] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53461] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53462] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53463] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53464] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53465] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53466] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53467] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53468] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53470] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53471] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53472] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53473] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53474] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53475] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53476] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53477] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53478] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53479] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53480] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53481] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53482] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53483] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53484] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53485] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53486] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53487] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53488] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53489] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53490] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53491] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53492] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53493] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53494] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53495] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53496] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53497] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53498] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53499] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53500] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53501] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53503] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53504] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53505] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53506] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53507] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53508] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53509] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53510] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53511] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53512] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53513] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53514] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53515] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53516] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53517] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53518] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53519] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53520] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53521] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53522] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53523] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53524] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53525] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53526] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53527] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53528] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53529] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53530] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53531] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53532] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53533] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53534] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53535] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53536] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53537] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53538] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53539] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53540] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53541] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53542] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53543] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53544] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53545] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53546] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53547] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53548] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53549] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53550] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53551] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53552] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53553] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53554] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53555] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53556] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53557] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53558] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53559] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53560] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53561] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53562] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53563] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53564] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53565] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53566] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53567] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53568] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53569] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53570] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53571] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53572] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53573] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53574] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53575] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53576] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53577] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53578] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53579] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53580] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53581] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53582] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53583] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53584] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53585] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53586] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53587] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53588] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53589] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53590] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53591] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53592] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53593] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53594] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53595] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53596] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53597] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53598] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53599] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53600] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53601] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53602] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53603] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53604] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53605] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53606] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53607] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53608] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53609] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53610] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53611] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53612] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53613] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53614] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53615] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53616] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53617] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53618] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53619] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53620] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53621] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53622] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53623] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53624] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53625] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-53626] = "fixed-version: Fixed from version 6.2.8"
+
+CVE_STATUS[CVE-2023-53627] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53628] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53629] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53630] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53631] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53632] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53633] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53634] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53635] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53636] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53637] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53638] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53639] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53640] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53641] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53642] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53643] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53644] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53645] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53646] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53647] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53648] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53649] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53650] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53651] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53652] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53653] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53654] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53655] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53656] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53657] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53658] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53659] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53660] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53661] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53662] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53663] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53664] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53665] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53666] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53667] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53668] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53669] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53670] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53671] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53672] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53673] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53674] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53675] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53676] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53677] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53678] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53679] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53680] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53681] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53682] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53683] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53684] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53685] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53686] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53687] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53692] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53693] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53694] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53695] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53696] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53697] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53698] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53699] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53700] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53702] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53703] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53704] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53705] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53706] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53707] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53708] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53709] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53710] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53711] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53712] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53713] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53714] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53715] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53716] = "fixed-version: Fixed from version 6.3.5"
+
+CVE_STATUS[CVE-2023-53717] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53718] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53719] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53720] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53721] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53722] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53723] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53724] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53725] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53726] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53727] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53728] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53729] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53730] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53731] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53732] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53733] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53742] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53743] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53744] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53745] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53746] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53747] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53748] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53750] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53751] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53752] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53753] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53754] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53755] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53756] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53757] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53758] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53759] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53760] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53761] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53762] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53763] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53764] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53765] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53766] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53767] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53768] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53769] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53777] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53778] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53780] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53781] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53782] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53783] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53784] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53785] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53786] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53787] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53788] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53789] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53790] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53791] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53792] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53793] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53794] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53795] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53796] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53797] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53798] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53799] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53800] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53801] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53802] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53803] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53804] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53806] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53807] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53808] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53809] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53810] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53811] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53812] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53813] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53814] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53815] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53816] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53817] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53818] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53819] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53820] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53821] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53822] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53823] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53824] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53825] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53826] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53827] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53828] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53829] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53830] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53831] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53832] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53833] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53834] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53836] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53837] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53838] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53839] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53840] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53841] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53842] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53843] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53844] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53845] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53846] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53847] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53848] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53849] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53850] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53851] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53852] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53853] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53854] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53855] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53856] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53857] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53858] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53859] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53860] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53861] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53862] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53863] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53864] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53865] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53866] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53867] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53986] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53987] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53988] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53989] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53990] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-53991] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53992] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53993] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-53994] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53995] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53996] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-53997] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53998] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-53999] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54000] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54001] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54002] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54003] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54004] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54005] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54006] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54007] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54008] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54009] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54010] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54011] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54012] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54013] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54014] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54015] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54016] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54017] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54018] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54019] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54020] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54021] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54022] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54023] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54024] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54025] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54026] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54027] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54028] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54030] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54031] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54032] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54033] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54034] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54035] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54036] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54037] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54038] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54039] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54040] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54041] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54042] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54043] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54044] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54045] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54046] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54047] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54048] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54049] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54050] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54051] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54052] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54053] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54055] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54056] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54057] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54058] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54059] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54060] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54062] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54063] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54064] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54065] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54066] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54067] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54068] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54069] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54070] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54071] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54072] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54073] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54074] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54075] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54076] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54077] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54078] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54079] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54080] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54081] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54083] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54084] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54085] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54086] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54087] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54088] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54089] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54090] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54091] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54092] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54093] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54094] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54095] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54096] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54097] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54098] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-54099] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54100] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54101] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54102] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54104] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54105] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54106] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54107] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54108] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54109] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54110] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-54111] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54112] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54113] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54114] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54115] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54116] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54117] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54118] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54119] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54120] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54121] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54122] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54123] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54124] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54125] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54126] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54127] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54128] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54129] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54130] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-54131] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54132] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54133] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54134] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54135] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54136] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54137] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54138] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54139] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54140] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54141] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54142] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54143] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54144] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-54145] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54146] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-54147] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54148] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54149] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54150] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54151] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54152] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54153] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54154] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54155] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54156] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54157] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54158] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54159] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54160] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54162] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54164] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54165] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54166] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54167] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54168] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54169] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54170] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54171] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54172] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54173] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54174] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54175] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54176] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54177] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54178] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54179] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54180] = "fixed-version: Fixed from version 6.2"
+
+CVE_STATUS[CVE-2023-54181] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54182] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54183] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54184] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54185] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54186] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54187] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54188] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54189] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54190] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54191] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54192] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54193] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54194] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54195] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54196] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54197] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54198] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54199] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54200] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54201] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54202] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54203] = "fixed-version: Fixed from version 6.2.11"
+
+CVE_STATUS[CVE-2023-54204] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54205] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54206] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54207] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54208] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54209] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54210] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54211] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54213] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54214] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54215] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54216] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54217] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54218] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54219] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54220] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54221] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54222] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54223] = "fixed-version: Fixed from version 6.4.10"
+
+CVE_STATUS[CVE-2023-54224] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54225] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54226] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54227] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54228] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54229] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54230] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54231] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54232] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54233] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54234] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54235] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54236] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54237] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54238] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54239] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54240] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54241] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54242] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54243] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54244] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54245] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54246] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54247] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54248] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54249] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54250] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54251] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54252] = "fixed-version: Fixed from version 6.2.11"
+
+CVE_STATUS[CVE-2023-54253] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54254] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54255] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54257] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54258] = "fixed-version: Fixed from version 6.4.12"
+
+CVE_STATUS[CVE-2023-54259] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54260] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54261] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54262] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54263] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54264] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54265] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54266] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54267] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54268] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54269] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54270] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54271] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54272] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54273] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54274] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54275] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54276] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54277] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54278] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54279] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54280] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54281] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54282] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54283] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54284] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54285] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54286] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54287] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54288] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54289] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54291] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54292] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54293] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54294] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54295] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54296] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54297] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54298] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54299] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54300] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54301] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54302] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54303] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54304] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54305] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54306] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54307] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54308] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54309] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54310] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54311] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54312] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54313] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54314] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54315] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54316] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54317] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54318] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54319] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54320] = "fixed-version: Fixed from version 6.4"
+
+CVE_STATUS[CVE-2023-54321] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54322] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-54323] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54324] = "fixed-version: Fixed from version 6.6"
+
+CVE_STATUS[CVE-2023-54325] = "fixed-version: Fixed from version 6.3"
+
+CVE_STATUS[CVE-2023-54326] = "fixed-version: Fixed from version 6.5"
+
+CVE_STATUS[CVE-2023-7324] = "fixed-version: Fixed from version 6.3"
+
+# CVE-2024-14027 may need backporting (fixed from 6.6.131)
+
+CVE_STATUS[CVE-2024-26581] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26582] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26583] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26584] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26585] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26586] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26587] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26588] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26589] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26590] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26591] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26592] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26593] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26594] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26595] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26596] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-26597] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26598] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26599] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26600] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26601] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26602] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26603] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26604] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26605] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26606] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26607] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26608] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26610] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26611] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26612] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26614] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26615] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26616] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26617] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26618] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26619] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26620] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26621] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-26622] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26623] = "cpe-stable-backport: Backported in 6.6.16"
+
+CVE_STATUS[CVE-2024-26625] = "cpe-stable-backport: Backported in 6.6.16"
+
+CVE_STATUS[CVE-2024-26626] = "cpe-stable-backport: Backported in 6.6.16"
+
+CVE_STATUS[CVE-2024-26627] = "cpe-stable-backport: Backported in 6.6.16"
+
+CVE_STATUS[CVE-2024-26629] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26630] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26631] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26632] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26633] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-26634] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26635] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26636] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26637] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26638] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26640] = "cpe-stable-backport: Backported in 6.6.16"
+
+CVE_STATUS[CVE-2024-26641] = "cpe-stable-backport: Backported in 6.6.16"
+
+CVE_STATUS[CVE-2024-26642] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26643] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26644] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26645] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26646] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26647] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26648] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26649] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26651] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26652] = "cpe-stable-backport: Backported in 6.6.22"
+
+CVE_STATUS[CVE-2024-26653] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26654] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26655] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26656] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26657] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26658] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26659] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26660] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26661] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26662] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26663] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26664] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26665] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26666] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26667] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26668] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26669] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26670] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26671] = "cpe-stable-backport: Backported in 6.6.16"
+
+# CVE-2024-26672 needs backporting (fixed from 6.8)
+
+CVE_STATUS[CVE-2024-26673] = "cpe-stable-backport: Backported in 6.6.16"
+
+CVE_STATUS[CVE-2024-26674] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26675] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26676] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26677] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26678] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26679] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26680] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26681] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26682] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26683] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26684] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-26685] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26686] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-26687] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26688] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26689] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26690] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26691] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26692] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26693] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26694] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26695] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26696] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26697] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26698] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26699] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26700] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26702] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26703] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26704] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26705] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26706] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26707] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26708] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26709] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26710] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26711] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26712] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26714] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26715] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26716] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26717] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26718] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26719] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26721] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26722] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26723] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26724] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26725] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26726] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26727] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26728] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26729] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26730] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26731] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26732] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26733] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26734] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26735] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26736] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26737] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26738] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26739] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26740] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26741] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26742] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26743] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26744] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26745] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26746] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26747] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26748] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26749] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26750] = "fixed-version: Fixed from version 5.15.151"
+
+CVE_STATUS[CVE-2024-26751] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26752] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26753] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26754] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26755] = "fixed-version: only affects 6.7 onwards"
+
+# CVE-2024-26756 needs backporting (fixed from 6.8)
+
+# CVE-2024-26757 needs backporting (fixed from 6.8)
+
+# CVE-2024-26758 needs backporting (fixed from 6.8)
+
+CVE_STATUS[CVE-2024-26759] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26760] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26761] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26762] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26763] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26764] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26765] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26766] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26767] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26768] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26769] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26770] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26771] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26772] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26773] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26774] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26775] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26776] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26777] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26778] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26779] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26780] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26781] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26782] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26783] = "cpe-stable-backport: Backported in 6.6.22"
+
+CVE_STATUS[CVE-2024-26784] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26785] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-26786] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26787] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26788] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26789] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26790] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26791] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26792] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26793] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26795] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26796] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26797] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26798] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26799] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26800] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26801] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26802] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26803] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26804] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26805] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26806] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26807] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26808] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-26809] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26810] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26811] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-26812] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26813] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26814] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26815] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26816] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26817] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-26818] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26820] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26822] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26823] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26824] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26825] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26826] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26828] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26829] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26830] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26831] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26832] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26833] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26834] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26835] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26836] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-26837] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26838] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26839] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26840] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26841] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26842] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26843] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26844] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26845] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26846] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-26847] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26849] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26850] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-26851] = "cpe-stable-backport: Backported in 6.6.22"
+
+CVE_STATUS[CVE-2024-26852] = "cpe-stable-backport: Backported in 6.6.22"
+
+CVE_STATUS[CVE-2024-26853] = "cpe-stable-backport: Backported in 6.6.22"
+
+CVE_STATUS[CVE-2024-26854] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26855] = "cpe-stable-backport: Backported in 6.6.22"
+
+CVE_STATUS[CVE-2024-26856] = "cpe-stable-backport: Backported in 6.6.22"
+
+CVE_STATUS[CVE-2024-26857] = "cpe-stable-backport: Backported in 6.6.22"
+
+CVE_STATUS[CVE-2024-26858] = "cpe-stable-backport: Backported in 6.6.22"
+
+CVE_STATUS[CVE-2024-26859] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26860] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26861] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26862] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26863] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26864] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26865] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26866] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26867] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26868] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26869] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26870] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26871] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26872] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26873] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26874] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26875] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26876] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-26877] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26878] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26879] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26880] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26881] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26882] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26883] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26884] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26885] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26886] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26887] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26888] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26889] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26890] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26891] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26892] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26893] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26894] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26895] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26896] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26897] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26898] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26899] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26900] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-26901] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26902] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26903] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26906] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26907] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26909] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26910] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26911] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26912] = "fixed-version: only affects 6.7 onwards"
+
+# CVE-2024-26913 needs backporting (fixed from 6.8)
+
+# CVE-2024-26914 needs backporting (fixed from 6.8)
+
+CVE_STATUS[CVE-2024-26915] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26916] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26917] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26918] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26919] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26920] = "cpe-stable-backport: Backported in 6.6.18"
+
+CVE_STATUS[CVE-2024-26921] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-26922] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26923] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-26924] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26925] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-26926] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26927] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-26928] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-26930] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26931] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26932] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-26933] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26934] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26935] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26936] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26937] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26938] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26939] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26940] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26941] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-26942] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-26943] = "cpe-stable-backport: Backported in 6.6.24"
+
+# CVE-2024-26944 needs backporting (fixed from 6.9)
+
+CVE_STATUS[CVE-2024-26945] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-26946] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26947] = "cpe-stable-backport: Backported in 6.6.24"
+
+# CVE-2024-26948 needs backporting (fixed from 6.9)
+
+CVE_STATUS[CVE-2024-26949] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26950] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26951] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26952] = "cpe-stable-backport: Backported in 6.6.32"
+
+CVE_STATUS[CVE-2024-26953] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26954] = "cpe-stable-backport: Backported in 6.6.32"
+
+CVE_STATUS[CVE-2024-26955] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26956] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26957] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26958] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26959] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26960] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26961] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26962] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-26963] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26964] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26965] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26966] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26967] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-26968] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26969] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26970] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26971] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26973] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26974] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26975] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26976] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26977] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26978] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-26980] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26981] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26982] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-26983] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26984] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26985] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-26986] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26987] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26988] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26989] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26990] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26991] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-26992] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26993] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26994] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26995] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-26996] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26997] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26998] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-26999] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27000] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27001] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27002] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27003] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27004] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27005] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27006] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-27007] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-27008] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27009] = "cpe-stable-backport: Backported in 6.6.29"
+
+# CVE-2024-27010 needs backporting (fixed from 6.9)
+
+CVE_STATUS[CVE-2024-27011] = "cpe-stable-backport: Backported in 6.6.55"
+
+# CVE-2024-27012 needs backporting (fixed from 6.9)
+
+CVE_STATUS[CVE-2024-27013] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27014] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27015] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27016] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27017] = "cpe-stable-backport: Backported in 6.6.53"
+
+CVE_STATUS[CVE-2024-27018] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27019] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27020] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-27021] = "fixed-version: only affects 6.8 onwards"
+
+# CVE-2024-27022 needs backporting (fixed from 6.9)
+
+CVE_STATUS[CVE-2024-27023] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-27024] = "cpe-stable-backport: Backported in 6.6.22"
+
+CVE_STATUS[CVE-2024-27025] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27026] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27027] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-27028] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27029] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-27030] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27031] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27032] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27033] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27034] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27035] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27036] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27037] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27038] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27039] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27040] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27041] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27043] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27044] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27045] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27046] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27047] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27048] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27049] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-27050] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27051] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27052] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27053] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27054] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27056] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2024-27057] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27058] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-27059] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-27060] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-27061] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-27062] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-27063] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-27064] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27065] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27066] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27067] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27068] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27069] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-27070] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-27071] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-27072] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-27073] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27074] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27075] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27076] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27077] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27078] = "cpe-stable-backport: Backported in 6.6.23"
+
+# CVE-2024-27079 needs backporting (fixed from 6.9)
+
+CVE_STATUS[CVE-2024-27080] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-27388] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27389] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27390] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27391] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27392] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-27393] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-27394] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-27395] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-27396] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-27397] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2024-27398] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-27399] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-27400] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-27401] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-27402] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-27403] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-27404] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-27405] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-27406] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-27407] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-27408] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-27409] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-27410] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-27411] = "fixed-version: only affects 6.7.6 onwards"
+
+CVE_STATUS[CVE-2024-27412] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-27413] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-27414] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-27415] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-27416] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-27417] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-27418] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-27419] = "cpe-stable-backport: Backported in 6.6.22"
+
+CVE_STATUS[CVE-2024-27431] = "cpe-stable-backport: Backported in 6.6.22"
+
+CVE_STATUS[CVE-2024-27432] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27433] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27434] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27435] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27436] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-27437] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-31076] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-32936] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-33619] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-33621] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-33847] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-34027] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-34030] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-34777] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-35247] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-35784] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35785] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35786] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35787] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35789] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35790] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35791] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35792] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35793] = "fixed-version: only affects 6.7 onwards"
+
+# CVE-2024-35794 needs backporting (fixed from 6.9)
+
+CVE_STATUS[CVE-2024-35795] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35796] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35797] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35798] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35799] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35800] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35801] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35803] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35804] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35805] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35806] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35807] = "cpe-stable-backport: Backported in 6.6.24"
+
+# CVE-2024-35808 needs backporting (fixed from 6.9)
+
+CVE_STATUS[CVE-2024-35809] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35810] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35811] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35813] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35814] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35815] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35816] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35817] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35818] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35819] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35821] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35822] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35823] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35824] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35825] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35826] = "cpe-stable-backport: Backported in 6.6.24"
+
+CVE_STATUS[CVE-2024-35827] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-35828] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-35829] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-35830] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-35831] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-35832] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-35833] = "cpe-stable-backport: Backported in 6.6.17"
+
+CVE_STATUS[CVE-2024-35834] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-35835] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-35836] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-35837] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-35838] = "cpe-stable-backport: Backported in 6.6.15"
+
+CVE_STATUS[CVE-2024-35839] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-35840] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-35841] = "cpe-stable-backport: Backported in 6.6.14"
+
+CVE_STATUS[CVE-2024-35842] = "cpe-stable-backport: Backported in 6.6.14"
+
+# CVE-2024-35843 needs backporting (fixed from 6.9)
+
+CVE_STATUS[CVE-2024-35844] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-35845] = "cpe-stable-backport: Backported in 6.6.23"
+
+CVE_STATUS[CVE-2024-35846] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-35847] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35848] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-35849] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35850] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35851] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35852] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35853] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35854] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35855] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35856] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35857] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35858] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35859] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-35860] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35861] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35862] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35863] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35864] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35865] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35866] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35867] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35868] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35869] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-35870] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-35871] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35872] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35873] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-35874] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-35875] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35877] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35878] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35879] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35880] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35882] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35883] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35884] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35885] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35886] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35887] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35888] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35889] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-35890] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35891] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35892] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35893] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35894] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-35895] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35896] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35897] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35898] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35899] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35900] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35901] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35902] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35903] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35904] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35905] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35907] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35908] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35909] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35910] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35911] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35912] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35913] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-35914] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-35915] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35916] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35917] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-35919] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35920] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35921] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35922] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35924] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35925] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35926] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-35927] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35929] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35930] = "cpe-stable-backport: Backported in 6.6.27"
+
+# CVE-2024-35931 needs backporting (fixed from 6.9)
+
+CVE_STATUS[CVE-2024-35932] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35933] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35934] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35935] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35936] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35937] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35938] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35939] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35940] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35942] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35943] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35944] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35945] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35946] = "cpe-stable-backport: Backported in 6.6.27"
+
+CVE_STATUS[CVE-2024-35947] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-35948] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-35949] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2024-35950] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35951] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35952] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35953] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35954] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35955] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35956] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35957] = "fixed-version: only affects 6.8.2 onwards"
+
+CVE_STATUS[CVE-2024-35958] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35959] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35960] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35961] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35962] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35963] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-35964] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-35965] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-35966] = "cpe-stable-backport: Backported in 6.6.47"
+
+CVE_STATUS[CVE-2024-35967] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35968] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-35969] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35970] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35971] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35972] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35973] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35974] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35975] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35976] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35977] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35978] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35979] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35980] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-35981] = "cpe-stable-backport: Backported in 6.6.29"
+
+CVE_STATUS[CVE-2024-35982] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-35983] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35984] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35985] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35986] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35987] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35988] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35989] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35990] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35991] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35992] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35993] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35994] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-35995] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35996] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35997] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35998] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-35999] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-36000] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-36001] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-36002] = "fixed-version: only affects 6.8.2 onwards"
+
+CVE_STATUS[CVE-2024-36003] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-36004] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-36005] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-36006] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-36007] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-36008] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-36009] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-36010] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-36011] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36012] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36013] = "cpe-stable-backport: Backported in 6.6.32"
+
+CVE_STATUS[CVE-2024-36014] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-36015] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-36016] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-36017] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36018] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-36019] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-36020] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-36021] = "cpe-stable-backport: Backported in 6.6.26"
+
+CVE_STATUS[CVE-2024-36023] = "cpe-stable-backport: Backported in 6.6.27"
+
+# CVE-2024-36024 needs backporting (fixed from 6.9)
+
+CVE_STATUS[CVE-2024-36025] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-36026] = "cpe-stable-backport: Backported in 6.6.28"
+
+CVE_STATUS[CVE-2024-36027] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-36028] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36029] = "cpe-stable-backport: Backported in 6.6.30"
+
+CVE_STATUS[CVE-2024-36030] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-36031] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36032] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36033] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-36244] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-36270] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-36281] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-36286] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-36288] = "fixed-version: only affects 6.9.3 onwards"
+
+CVE_STATUS[CVE-2024-36476] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-36477] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-36478] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-36479] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-36481] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-36484] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-36489] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-36880] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36881] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36882] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36883] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36884] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-36886] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36887] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36888] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36889] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36890] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36891] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36892] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-36893] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36894] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36895] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36896] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36897] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36898] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36899] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36900] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36901] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36902] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36903] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36904] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36905] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36906] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36908] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36909] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36910] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36911] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36912] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36913] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36914] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36915] = "cpe-stable-backport: Backported in 6.6.47"
+
+CVE_STATUS[CVE-2024-36916] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36917] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36918] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36919] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36920] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36921] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36922] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36924] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36925] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36926] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36927] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36928] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36929] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36930] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36931] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36932] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-36933] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36934] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36935] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-36936] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-36937] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36938] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36939] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36940] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36941] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36943] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-36944] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36945] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36946] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36947] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36948] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-36949] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36950] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36951] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36952] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36953] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36954] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36955] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36956] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-36957] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36958] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-36959] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36960] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36961] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-36962] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36963] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36964] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-36965] = "cpe-stable-backport: Backported in 6.6.32"
+
+CVE_STATUS[CVE-2024-36966] = "cpe-stable-backport: Backported in 6.6.32"
+
+CVE_STATUS[CVE-2024-36967] = "cpe-stable-backport: Backported in 6.6.32"
+
+CVE_STATUS[CVE-2024-36968] = "cpe-stable-backport: Backported in 6.6.32"
+
+CVE_STATUS[CVE-2024-36969] = "cpe-stable-backport: Backported in 6.6.32"
+
+CVE_STATUS[CVE-2024-36970] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-36971] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-36972] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-36973] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-36974] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-36975] = "cpe-stable-backport: Backported in 6.6.32"
+
+CVE_STATUS[CVE-2024-36976] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-36977] = "cpe-stable-backport: Backported in 6.6.32"
+
+CVE_STATUS[CVE-2024-36978] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-36979] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-37021] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-37026] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-37078] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-37354] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-37356] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38306] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-38381] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38384] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38385] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-38388] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38390] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38538] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38539] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38540] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38541] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38542] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-38543] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38544] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38545] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38546] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38547] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38548] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38549] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38550] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38551] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38552] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38553] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38554] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38555] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38556] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38557] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38558] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38559] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38560] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38561] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38562] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38563] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-38564] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38565] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38566] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38567] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38568] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38569] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38570] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38571] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38572] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38573] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38574] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-38575] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38576] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38577] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38578] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38579] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38580] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38581] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38582] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38583] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38584] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38585] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38586] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38587] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38588] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38589] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38590] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38591] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38592] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-38593] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38594] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-38595] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-38596] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38597] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38598] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38599] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38600] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38601] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38602] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38603] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38604] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38605] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38606] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-38607] = "cpe-stable-backport: Backported in 6.6.33"
+
+# CVE-2024-38608 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-38609] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-38610] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38611] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38612] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38613] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38614] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38615] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38616] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38617] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38618] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38619] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-38620] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38621] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38622] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38623] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38624] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38625] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38626] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-38627] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38628] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38629] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38630] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38631] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-38632] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38633] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38634] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38635] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38636] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38637] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38659] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38661] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-38662] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38663] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38664] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38667] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-38780] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-39276] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39277] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-39282] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-39291] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-39292] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-39293] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-39296] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39298] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39301] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39371] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39461] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39462] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39463] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39464] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39465] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-39466] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39467] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39468] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39469] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39470] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39471] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39472] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-39473] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39474] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39475] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39476] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39477] = "fixed-version: only affects 6.9 onwards"
+
+# CVE-2024-39478 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-39479] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39480] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39481] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39482] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39483] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39484] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39485] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39486] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-39487] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-39488] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-39489] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-39490] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-39491] = "cpe-stable-backport: Backported in 6.6.33"
+
+CVE_STATUS[CVE-2024-39492] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-39493] = "cpe-stable-backport: Backported in 6.6.34"
+
+CVE_STATUS[CVE-2024-39494] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39495] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39496] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39497] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39498] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-39499] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39500] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39502] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39503] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39504] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39505] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39506] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39507] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39508] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39509] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-39510] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-40899] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-40900] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40901] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40902] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40903] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40904] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40905] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40906] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40907] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-40908] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40909] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40910] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40911] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40912] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40913] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40914] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40915] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40916] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40917] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-40918] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40919] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40920] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40921] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40922] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40923] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40924] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40925] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40926] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-40927] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40928] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40929] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40930] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-40931] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40932] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40933] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-40934] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40935] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40936] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40937] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40938] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40939] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40940] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40941] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40942] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40943] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40944] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40945] = "cpe-stable-backport: Backported in 6.6.35"
+
+CVE_STATUS[CVE-2024-40947] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-40948] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40949] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-40950] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-40951] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40952] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40953] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40954] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40955] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40956] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40957] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40958] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40959] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40960] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40961] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40962] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40963] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40964] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40965] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-40966] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40967] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40968] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40969] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40970] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40971] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40972] = "cpe-stable-backport: Backported in 6.6.47"
+
+CVE_STATUS[CVE-2024-40973] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40974] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40975] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-40976] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40977] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40978] = "cpe-stable-backport: Backported in 6.6.36"
+
+# CVE-2024-40979 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-40980] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40981] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40983] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40984] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40985] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-40986] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-40987] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40988] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40989] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40990] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40991] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-40992] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40993] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40994] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40995] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40996] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40997] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-40998] = "cpe-stable-backport: Backported in 6.6.36"
+
+# CVE-2024-40999 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-41000] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-41001] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-41002] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-41003] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-41004] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-41005] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-41006] = "cpe-stable-backport: Backported in 6.6.36"
+
+CVE_STATUS[CVE-2024-41007] = "cpe-stable-backport: Backported in 6.6.41"
+
+# CVE-2024-41008 needs backporting (fixed from 6.9)
+
+CVE_STATUS[CVE-2024-41009] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-41010] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41011] = "cpe-stable-backport: Backported in 6.6.31"
+
+CVE_STATUS[CVE-2024-41012] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41013] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-41014] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-41015] = "cpe-stable-backport: Backported in 6.6.43"
+
+CVE_STATUS[CVE-2024-41016] = "cpe-stable-backport: Backported in 6.6.53"
+
+CVE_STATUS[CVE-2024-41017] = "cpe-stable-backport: Backported in 6.6.43"
+
+CVE_STATUS[CVE-2024-41018] = "cpe-stable-backport: Backported in 6.6.43"
+
+CVE_STATUS[CVE-2024-41019] = "cpe-stable-backport: Backported in 6.6.43"
+
+CVE_STATUS[CVE-2024-41020] = "cpe-stable-backport: Backported in 6.6.43"
+
+CVE_STATUS[CVE-2024-41021] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-41022] = "cpe-stable-backport: Backported in 6.6.43"
+
+# CVE-2024-41023 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-41025] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41026] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-41027] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41028] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41029] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-41030] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41031] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41032] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41033] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-41034] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41035] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41036] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41037] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41038] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41039] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41040] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41041] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41042] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-41043] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-41044] = "cpe-stable-backport: Backported in 6.6.41"
+
+# CVE-2024-41045 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-41046] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41047] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41048] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41049] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41050] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41051] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41052] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41053] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41054] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41055] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41056] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-41057] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41058] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41059] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41060] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41061] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-41062] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41063] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41064] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41065] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41066] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41067] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-41068] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41069] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41070] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41072] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41073] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41074] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41075] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41076] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41077] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41078] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41079] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-41080] = "cpe-stable-backport: Backported in 6.6.62"
+
+CVE_STATUS[CVE-2024-41081] = "cpe-stable-backport: Backported in 6.6.42"
+
+# CVE-2024-41082 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-41083] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-41084] = "cpe-stable-backport: Backported in 6.6.37"
+
+# CVE-2024-41085 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-41086] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-41087] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-41088] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-41089] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-41090] = "cpe-stable-backport: Backported in 6.6.43"
+
+CVE_STATUS[CVE-2024-41091] = "cpe-stable-backport: Backported in 6.6.43"
+
+CVE_STATUS[CVE-2024-41092] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-41093] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-41094] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-41095] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-41096] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-41097] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-41098] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-41149] = "fixed-version: only affects 6.12.6 onwards"
+
+# CVE-2024-41932 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-41935] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-42063] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42064] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-42065] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42066] = "fixed-version: only affects 6.8 onwards"
+
+# CVE-2024-42067 needs backporting (fixed from 6.10)
+
+# CVE-2024-42068 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-42069] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42070] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42071] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-42072] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-42073] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42074] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42075] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-42076] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42077] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42078] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42079] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42080] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42081] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42082] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42083] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-42084] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42085] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42086] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42087] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42088] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42089] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42090] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42091] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42092] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42093] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42094] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42095] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42096] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42097] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42098] = "cpe-stable-backport: Backported in 6.6.37"
+
+CVE_STATUS[CVE-2024-42099] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-42100] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42101] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42102] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42103] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42104] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42105] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42106] = "cpe-stable-backport: Backported in 6.6.39"
+
+# CVE-2024-42107 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-42108] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42109] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42110] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42111] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-42112] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-42113] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42114] = "cpe-stable-backport: Backported in 6.6.47"
+
+CVE_STATUS[CVE-2024-42115] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42117] = "fixed-version: only affects 6.7 onwards"
+
+# CVE-2024-42118 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-42119] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42120] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42121] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42122] = "cpe-stable-backport: Backported in 6.6.64"
+
+# CVE-2024-42123 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-42124] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42125] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-42126] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42127] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42128] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42129] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-42131] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42132] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42133] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42134] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42135] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42136] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42137] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42138] = "cpe-stable-backport: Backported in 6.6.39"
+
+# CVE-2024-42139 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-42140] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42141] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42142] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42144] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42145] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42146] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42147] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42148] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42149] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42150] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-42151] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42152] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42153] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42154] = "cpe-stable-backport: Backported in 6.6.39"
+
+# CVE-2024-42155 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-42156] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-42157] = "cpe-stable-backport: Backported in 6.6.39"
+
+# CVE-2024-42158 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-42159] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42160] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42161] = "cpe-stable-backport: Backported in 6.6.39"
+
+# CVE-2024-42162 needs backporting (fixed from 6.10)
+
+CVE_STATUS[CVE-2024-42223] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42224] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42225] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42227] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-42228] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42229] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42230] = "cpe-stable-backport: Backported in 6.6.39"
+
+CVE_STATUS[CVE-2024-42231] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-42232] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42233] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-42234] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-42235] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42236] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42237] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42238] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42239] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42240] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42241] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42242] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-42243] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42244] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42245] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42246] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42247] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42248] = "cpe-stable-backport: Backported in 6.6.41"
+
+CVE_STATUS[CVE-2024-42249] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-42250] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42251] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-42252] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-42253] = "cpe-stable-backport: Backported in 6.6.42"
+
+CVE_STATUS[CVE-2024-42254] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-42255] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-42256] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-42257] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2024-42258 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-42259] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-42260] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42261] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42262] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42263] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42264] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-42265] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-42266] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-42267] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-42268] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-42269] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-42270] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-42271] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-42272] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-42273] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-42274] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-42275] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-42276] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42277] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42278] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42279] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42280] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42281] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42282] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-42283] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42284] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42285] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42286] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42287] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42288] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42289] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42290] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42291] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42292] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42293] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-42294] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42295] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42296] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42297] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42298] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42299] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42300] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-42301] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42302] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42303] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42304] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42305] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42306] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42307] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42309] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42310] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42311] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42312] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-42313] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42314] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42315] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42316] = "cpe-stable-backport: Backported in 6.6.44"
+
+# CVE-2024-42317 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-42318] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42319] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-42320] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42321] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-42322] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43098] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-43815] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-43816] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-43817] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43818] = "cpe-stable-backport: Backported in 6.6.44"
+
+# CVE-2024-43819 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-43820] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-43821] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43822] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-43823] = "cpe-stable-backport: Backported in 6.6.44"
+
+# CVE-2024-43824 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-43825] = "cpe-stable-backport: Backported in 6.6.44"
+
+# CVE-2024-43826 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2024-43827] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-43828] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43829] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43830] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43831] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43832] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43833] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43834] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43835] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-43836] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-43837] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43838] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-43839] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43840] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2024-43841] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43842] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43843] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-43844] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-43845] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43846] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43847] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43848] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-43849] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43850] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43851] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43852] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-43853] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43854] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43855] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43856] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43857] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-43858] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43859] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43860] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43861] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43862] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-43863] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-43864] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-43865] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-43866] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-43867] = "cpe-stable-backport: Backported in 6.6.45"
+
+CVE_STATUS[CVE-2024-43868] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-43869] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43870] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43871] = "cpe-stable-backport: Backported in 6.6.44"
+
+# CVE-2024-43872 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-43873] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43874] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-43875] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43876] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43877] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43878] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-43879] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43880] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43881] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-43882] = "cpe-stable-backport: Backported in 6.6.47"
+
+CVE_STATUS[CVE-2024-43883] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43884] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-43886] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-43887] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-43888] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-43889] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43890] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43891] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-43892] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43893] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43894] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43896] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-43897] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43899] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2024-43900] = "cpe-stable-backport: Backported in 6.6.46"
+
+# CVE-2024-43901 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-43902] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43904] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-43905] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43906] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43907] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43908] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43909] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43910] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-43911] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-43912] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-43913] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-43914] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44931] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44932] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-44933] = "fixed-version: only affects 6.10.4 onwards"
+
+CVE_STATUS[CVE-2024-44934] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44935] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44936] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-44937] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-44938] = "cpe-stable-backport: Backported in 6.6.47"
+
+CVE_STATUS[CVE-2024-44939] = "cpe-stable-backport: Backported in 6.6.47"
+
+CVE_STATUS[CVE-2024-44940] = "cpe-stable-backport: Backported in 6.6.47"
+
+CVE_STATUS[CVE-2024-44941] = "cpe-stable-backport: Backported in 6.6.47"
+
+CVE_STATUS[CVE-2024-44942] = "cpe-stable-backport: Backported in 6.6.47"
+
+CVE_STATUS[CVE-2024-44943] = "cpe-stable-backport: Backported in 6.6.47"
+
+CVE_STATUS[CVE-2024-44944] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-44945] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-44946] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44947] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44948] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44949] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44950] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-44951] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-44953] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-44954] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44956] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-44957] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44958] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44959] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44960] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44961] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44962] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44963] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-44964] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-44965] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44966] = "cpe-stable-backport: Backported in 6.6.47"
+
+CVE_STATUS[CVE-2024-44967] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44968] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44969] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44970] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44971] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-44973] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-44974] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44975] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-44976] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-44977] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44978] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-44979] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-44980] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-44981] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-44982] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44983] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44984] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44985] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44986] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44987] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44988] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44989] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44990] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44991] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44992] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-44993] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-44994] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-44995] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44996] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44997] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44998] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-44999] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45000] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45001] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45002] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45003] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45004] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-45005] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45006] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45007] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45008] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45009] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45010] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45011] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45012] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45013] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-45014] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-45015] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45016] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45017] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-45018] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45019] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45020] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45021] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45022] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45023] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-45024] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-45025] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45026] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45027] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-45028] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45029] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45030] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-45828] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-46672] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-46673] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46674] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46675] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46676] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46677] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46678] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46679] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46680] = "cpe-stable-backport: Backported in 6.6.49"
+
+# CVE-2024-46681 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-46682] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-46683] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-46684] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-46685] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46686] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46687] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46688] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-46689] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46690] = "fixed-version: only affects 6.9 onwards"
+
+# CVE-2024-46691 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2024-46692] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46693] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46694] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46695] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46696] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-46697] = "fixed-version: only affects 6.7 onwards"
+
+# CVE-2024-46698 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-46699] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2024-46701 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-46702] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-46703] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-46704] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-46705] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-46706] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-46707] = "cpe-stable-backport: Backported in 6.6.48"
+
+CVE_STATUS[CVE-2024-46708] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-46709] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46710] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-46711] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-46712] = "fixed-version: only affects 6.10.4 onwards"
+
+CVE_STATUS[CVE-2024-46713] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46714] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46715] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46716] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46717] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46718] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-46719] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46720] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46721] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46722] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46723] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46724] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46725] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46726] = "cpe-stable-backport: Backported in 6.6.50"
+
+# CVE-2024-46727 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-46728] = "cpe-stable-backport: Backported in 6.6.50"
+
+# CVE-2024-46729 needs backporting (fixed from 6.11)
+
+# CVE-2024-46730 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-46731] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46732] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46733] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2024-46734] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46735] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46736] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46737] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46738] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46739] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46740] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46741] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46742] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46743] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46744] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46745] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46746] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46747] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46748] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-46749] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46750] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46751] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2024-46752] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46753] = "cpe-stable-backport: Backported in 6.6.87"
+
+# CVE-2024-46754 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-46755] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46759] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46760] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46761] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46762] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46763] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46764] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-46765] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46766] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-46767] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46768] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46769] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-46770] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46771] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46772] = "cpe-stable-backport: Backported in 6.6.86"
+
+CVE_STATUS[CVE-2024-46773] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46774] = "cpe-stable-backport: Backported in 6.6.88"
+
+# CVE-2024-46775 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-46776] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46777] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46778] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-46779] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-46780] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46781] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46782] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46783] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46784] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46785] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46786] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46787] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46788] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46789] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-46790] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-46791] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46792] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-46793] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-46794] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46795] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46796] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46797] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46798] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46799] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-46800] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46801] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-46802] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46803] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46804] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46805] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46806] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46807] = "cpe-stable-backport: Backported in 6.6.50"
+
+# CVE-2024-46808 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-46809] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46810] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46811] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46812] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46813] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2024-46814] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46815] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46816] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2024-46817] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46818] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46819] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46820] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-46821] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46822] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46823] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-46824] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-46825] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46826] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46827] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46828] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46829] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46830] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46831] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46832] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46833] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2024-46834 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-46835] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46836] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46837] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-46838] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46840] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46841] = "cpe-stable-backport: Backported in 6.6.64"
+
+# CVE-2024-46842 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-46843] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46844] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46845] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46846] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46847] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46848] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-46849] = "cpe-stable-backport: Backported in 6.6.52"
+
+CVE_STATUS[CVE-2024-46850] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-46851] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-46852] = "cpe-stable-backport: Backported in 6.6.52"
+
+CVE_STATUS[CVE-2024-46853] = "cpe-stable-backport: Backported in 6.6.52"
+
+CVE_STATUS[CVE-2024-46854] = "cpe-stable-backport: Backported in 6.6.52"
+
+CVE_STATUS[CVE-2024-46855] = "cpe-stable-backport: Backported in 6.6.52"
+
+CVE_STATUS[CVE-2024-46856] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-46857] = "cpe-stable-backport: Backported in 6.6.52"
+
+CVE_STATUS[CVE-2024-46858] = "cpe-stable-backport: Backported in 6.6.52"
+
+CVE_STATUS[CVE-2024-46859] = "cpe-stable-backport: Backported in 6.6.52"
+
+CVE_STATUS[CVE-2024-46860] = "cpe-stable-backport: Backported in 6.6.52"
+
+CVE_STATUS[CVE-2024-46861] = "cpe-stable-backport: Backported in 6.6.52"
+
+CVE_STATUS[CVE-2024-46862] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-46863] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-46864] = "cpe-stable-backport: Backported in 6.6.52"
+
+CVE_STATUS[CVE-2024-46865] = "cpe-stable-backport: Backported in 6.6.52"
+
+CVE_STATUS[CVE-2024-46866] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-46867] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-46868] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-46869] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2024-46870 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-46871] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-46896] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-47141] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-47143] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-47408] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-47658] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-47659] = "cpe-stable-backport: Backported in 6.6.50"
+
+CVE_STATUS[CVE-2024-47660] = "cpe-stable-backport: Backported in 6.6.50"
+
+# CVE-2024-47661 needs backporting (fixed from 6.11)
+
+# CVE-2024-47662 needs backporting (fixed from 6.11)
+
+CVE_STATUS[CVE-2024-47663] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-47664] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-47665] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-47666] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-47667] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-47668] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-47669] = "cpe-stable-backport: Backported in 6.6.51"
+
+CVE_STATUS[CVE-2024-47670] = "cpe-stable-backport: Backported in 6.6.53"
+
+CVE_STATUS[CVE-2024-47671] = "cpe-stable-backport: Backported in 6.6.53"
+
+CVE_STATUS[CVE-2024-47673] = "cpe-stable-backport: Backported in 6.6.53"
+
+CVE_STATUS[CVE-2024-47674] = "cpe-stable-backport: Backported in 6.6.52"
+
+CVE_STATUS[CVE-2024-47675] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47676] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-47677] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-47678] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47679] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47680] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-47681] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47682] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47683] = "cpe-stable-backport: Backported in 6.6.46"
+
+CVE_STATUS[CVE-2024-47684] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47685] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47686] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47687] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-47688] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47689] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47690] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47691] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47692] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47693] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47694] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-47695] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47696] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47697] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47698] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47699] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47700] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47701] = "cpe-stable-backport: Backported in 6.6.54"
+
+# CVE-2024-47702 needs backporting (fixed from 6.12)
+
+# CVE-2024-47703 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-47704] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-47705] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47706] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47707] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47708] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-47709] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47710] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47711] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-47712] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47713] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47714] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47715] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47716] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47717] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-47718] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47719] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47720] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47721] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-47723] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47724] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-47726] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-47727] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47728] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47729] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-47730] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47731] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47732] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-47733] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-47734] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47735] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47736] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-47737] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47738] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47739] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47740] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47741] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47742] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47743] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47744] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47745] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47746] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-47747] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47748] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47749] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47750] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47751] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47752] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47753] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47754] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47756] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-47757] = "cpe-stable-backport: Backported in 6.6.54"
+
+# CVE-2024-47794 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-47809] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-48873] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-48875] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-48876] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-48881] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-49568] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-49569] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2024-49570] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-49571] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-49573] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-49850] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-49851] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-49852] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-49853] = "cpe-stable-backport: Backported in 6.6.54"
+
+# CVE-2024-49854 has no known resolution
+
+CVE_STATUS[CVE-2024-49855] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-49856] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-49857] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-49858] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-49859] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-49860] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-49861] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-49862] = "cpe-stable-backport: Backported in 6.6.54"
+
+CVE_STATUS[CVE-2024-49863] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49864] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49865] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-49866] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49867] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49868] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49869] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-49870] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49871] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49872] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-49873] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-49874] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49875] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49876] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-49877] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49878] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49879] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49880] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-49881] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49882] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49883] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49884] = "cpe-stable-backport: Backported in 6.6.55"
+
+# CVE-2024-49885 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-49886] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49887] = "fixed-version: only affects 6.9 onwards"
+
+# CVE-2024-49888 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-49889] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49890] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49891] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-49892] = "cpe-stable-backport: Backported in 6.6.55"
+
+# CVE-2024-49893 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-49894] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49895] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49896] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49897] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-49898] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-49899] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-49900] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49901] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49902] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49903] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49904] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-49905] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49906] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-49907] = "cpe-stable-backport: Backported in 6.6.55"
+
+# CVE-2024-49908 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-49909] = "cpe-stable-backport: Backported in 6.6.64"
+
+# CVE-2024-49910 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-49911] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-49912] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49913] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49914] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-49915] = "cpe-stable-backport: Backported in 6.6.64"
+
+# CVE-2024-49916 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-49917] = "cpe-stable-backport: Backported in 6.6.64"
+
+# CVE-2024-49918 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-49919] = "cpe-stable-backport: Backported in 6.6.79"
+
+# CVE-2024-49920 needs backporting (fixed from 6.12)
+
+# CVE-2024-49921 needs backporting (fixed from 6.12)
+
+# CVE-2024-49922 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-49923] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2024-49924] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49925] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49926] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-49927] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49928] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-49929] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49930] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49931] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49932] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-49933] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49934] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-49935] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49936] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49937] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49938] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49939] = "cpe-stable-backport: Backported in 6.6.55"
+
+# CVE-2024-49940 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-49941] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-49942] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-49943] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-49944] = "cpe-stable-backport: Backported in 6.6.55"
+
+# CVE-2024-49945 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-49946] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49947] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49948] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49949] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49950] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49951] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49952] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49953] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49954] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49955] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49956] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-49957] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49958] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49959] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49960] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49961] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49962] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49963] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49964] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-49965] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49966] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49968] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2024-49969] = "cpe-stable-backport: Backported in 6.6.55"
+
+# CVE-2024-49970 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-49971] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-49972] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-49973] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49974] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-49975] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49976] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49977] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49978] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49979] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-49980] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49981] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49982] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49983] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49984] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-49985] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49986] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49987] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49988] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49989] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49990] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-49991] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49992] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49994] = "cpe-stable-backport: Backported in 6.6.75"
+
+CVE_STATUS[CVE-2024-49996] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49997] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-49998] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2024-49999] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50000] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50001] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50002] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50003] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50004] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-50005] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50006] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50007] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50008] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50009] = "cpe-stable-backport: Backported in 6.6.75"
+
+CVE_STATUS[CVE-2024-50010] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50011] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50012] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50013] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50014] = "cpe-stable-backport: Backported in 6.6.75"
+
+CVE_STATUS[CVE-2024-50015] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50017] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-50019] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50020] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-50021] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-50022] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50023] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50024] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50025] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50026] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50027] = "cpe-stable-backport: Backported in 6.6.60"
+
+# CVE-2024-50028 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-50029] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50030] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50031] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50033] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50034] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50035] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50036] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50037] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50038] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50039] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50040] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50041] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50042] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50043] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-50044] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50045] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50046] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50047] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50048] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50049] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50051] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-50055] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50056] = "cpe-stable-backport: Backported in 6.6.86"
+
+CVE_STATUS[CVE-2024-50057] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50058] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50059] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50060] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50061] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50062] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50063] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50064] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50065] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50066] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50067] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50068] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-50069] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50070] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50071] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50072] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50073] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50074] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50075] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50076] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50077] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50078] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50079] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-50080] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50081] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-50082] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50083] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50084] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50085] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50086] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50087] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50088] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50090] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50091] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-50092] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-50093] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50094] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50095] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50096] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50097] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50098] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50099] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50100] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-50101] = "cpe-stable-backport: Backported in 6.6.58"
+
+# CVE-2024-50102 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-50103] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50104] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50105] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50106] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-50107] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50108] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50109] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-50110] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50111] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50112] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50113] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50114] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50115] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50116] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50117] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50118] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50119] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-50120] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50121] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50122] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50123] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-50124] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50125] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50126] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50127] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50128] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50129] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-50130] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50131] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50132] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-50133] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50134] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50135] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50136] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50137] = "cpe-stable-backport: Backported in 6.6.86"
+
+CVE_STATUS[CVE-2024-50138] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2024-50139] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50140] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50141] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50142] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50143] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50144] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50145] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50146] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2024-50147] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50148] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50149] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-50150] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50151] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50152] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50153] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50154] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50155] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50156] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50157] = "cpe-stable-backport: Backported in 6.6.75"
+
+CVE_STATUS[CVE-2024-50158] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50159] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50160] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50161] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50162] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50163] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50164] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50165] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-50166] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50167] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50168] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50169] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50170] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50171] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50172] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50173] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-50174] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-50175] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50176] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50177] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50178] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50179] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-50180] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50182] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50183] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50184] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50185] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50186] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50187] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50188] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50189] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50190] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-50191] = "cpe-stable-backport: Backported in 6.6.57"
+
+CVE_STATUS[CVE-2024-50192] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50193] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50194] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50195] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50196] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50197] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50198] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50199] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50200] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50201] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50202] = "cpe-stable-backport: Backported in 6.6.58"
+
+CVE_STATUS[CVE-2024-50203] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50204] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50205] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50206] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-50207] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50208] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50209] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50210] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50211] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-50212] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-50213] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50214] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50215] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50216] = "cpe-stable-backport: Backported in 6.6.60"
+
+# CVE-2024-50217 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-50218] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50220] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50221] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-50222] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50223] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50224] = "cpe-stable-backport: Backported in 6.6.60"
+
+# CVE-2024-50225 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-50226] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50227] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50229] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50230] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50231] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50232] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50233] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50234] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50235] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50236] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50237] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50238] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-50239] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50240] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50241] = "fixed-version: only affects 6.11.3 onwards"
+
+CVE_STATUS[CVE-2024-50242] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50243] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50244] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50245] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50246] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50247] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50248] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50249] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50250] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50251] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50252] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50253] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50254] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50255] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50256] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50257] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50258] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50259] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50260] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-50261] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50262] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-50263] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50264] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50265] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50266] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50267] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50268] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50269] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50270] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50271] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50272] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50273] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50274] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-50275] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50276] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50277] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-50278] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50279] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50280] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50281] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50282] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50283] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50284] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50285] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50286] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50287] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50288] = "fixed-version: only affects 6.8 onwards"
+
+# CVE-2024-50289 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-50290] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50291] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50292] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50293] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-50294] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50295] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50296] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50297] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50298] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50299] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50300] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50301] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50302] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-50303] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-50304] = "cpe-stable-backport: Backported in 6.6.75"
+
+CVE_STATUS[CVE-2024-51729] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-52319] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-52332] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-52557] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2024-52559] = "cpe-stable-backport: Backported in 6.6.80"
+
+# CVE-2024-52560 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2024-53042] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-53043] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-53044] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-53045] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-53046] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-53047] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-53048] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-53049] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53050] = "fixed-version: only affects 6.7 onwards"
+
+# CVE-2024-53051 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-53052] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-53053] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-53055] = "cpe-stable-backport: Backported in 6.6.60"
+
+# CVE-2024-53056 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-53057] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-53058] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-53059] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-53060] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-53061] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-53062] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-53063] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-53064] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-53065] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53066] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-53067] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-53068] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-53069] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53070] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-53071] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-53072] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-53073] = "fixed-version: only affects 6.11.3 onwards"
+
+CVE_STATUS[CVE-2024-53074] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-53075] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53076] = "cpe-stable-backport: Backported in 6.6.60"
+
+CVE_STATUS[CVE-2024-53077] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53078] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53079] = "cpe-stable-backport: Backported in 6.6.62"
+
+CVE_STATUS[CVE-2024-53080] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-53081] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-53082] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-53083] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-53084] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-53085] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53086] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-53087] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-53088] = "cpe-stable-backport: Backported in 6.6.61"
+
+# CVE-2024-53089 needs backporting (fixed from 6.12)
+
+# CVE-2024-53090 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-53091] = "cpe-stable-backport: Backported in 6.6.62"
+
+CVE_STATUS[CVE-2024-53092] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53093] = "cpe-stable-backport: Backported in 6.6.62"
+
+CVE_STATUS[CVE-2024-53094] = "cpe-stable-backport: Backported in 6.6.62"
+
+CVE_STATUS[CVE-2024-53095] = "cpe-stable-backport: Backported in 6.6.62"
+
+CVE_STATUS[CVE-2024-53096] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53097] = "cpe-stable-backport: Backported in 6.6.62"
+
+CVE_STATUS[CVE-2024-53098] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-53099] = "cpe-stable-backport: Backported in 6.6.62"
+
+CVE_STATUS[CVE-2024-53100] = "cpe-stable-backport: Backported in 6.6.62"
+
+CVE_STATUS[CVE-2024-53101] = "cpe-stable-backport: Backported in 6.6.62"
+
+CVE_STATUS[CVE-2024-53103] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-53104] = "cpe-stable-backport: Backported in 6.6.61"
+
+CVE_STATUS[CVE-2024-53105] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-53106] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53107] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-53108] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53109] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53110] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53111] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-53112] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53113] = "cpe-stable-backport: Backported in 6.6.63"
+
+# CVE-2024-53114 needs backporting (fixed from 6.12)
+
+CVE_STATUS[CVE-2024-53115] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53116] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-53117] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-53118] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-53119] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53120] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53121] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53122] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53123] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53124] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2024-53125] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-53126] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53127] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53128] = "cpe-stable-backport: Backported in 6.6.69"
+
+CVE_STATUS[CVE-2024-53129] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53130] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53131] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53132] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53133] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-53134] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53135] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53136] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53137] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-53138] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53139] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53140] = "cpe-stable-backport: Backported in 6.6.63"
+
+CVE_STATUS[CVE-2024-53141] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53142] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53143] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-53144] = "cpe-stable-backport: Backported in 6.6.55"
+
+CVE_STATUS[CVE-2024-53145] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53146] = "cpe-stable-backport: Backported in 6.6.64"
+
+# CVE-2024-53147 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-53148] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53149] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-53150] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53151] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53152] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-53153] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-53154] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53155] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53156] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53157] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53158] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53160] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53161] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53162] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53163] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-53164] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-53165] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53166] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53167] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53168] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53169] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53170] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2024-53171] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53172] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53173] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53174] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53175] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53176] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53177] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53178] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53179] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-53180] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53181] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53182] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-53183] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53184] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53185] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53186] = "cpe-stable-backport: Backported in 6.6.64"
+
+# CVE-2024-53187 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-53188] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53189] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53190] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53191] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53192] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-53193] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-53194] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53195] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53196] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-53197] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53198] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53199] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53200] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53201] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53202] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53203] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2024-53204] = "cpe-stable-backport: Backported in 6.6.4"
+
+CVE_STATUS[CVE-2024-53205] = "cpe-stable-backport: Backported in 6.6.4"
+
+CVE_STATUS[CVE-2024-53206] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53207] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53208] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53209] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2024-53210] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53211] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-53212] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-53213] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53214] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53215] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53216] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53217] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53218] = "cpe-stable-backport: Backported in 6.6.64"
+
+# CVE-2024-53219 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-53220] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53221] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-53222] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2024-53223] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53224] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53225] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-53226] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53227] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53228] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-53229] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53230] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53231] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53232] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-53233] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53234] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53235] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-53236] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-53237] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53238] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-53239] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-53240] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-53241] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-53680] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-53681] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-53682] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-53685] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-53687] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-53690] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-54031] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-54191] = "fixed-version: only affects 6.12.2 onwards"
+
+CVE_STATUS[CVE-2024-54193] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-54455] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-54456] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2024-54458] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2024-54460] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-54683] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-55639] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-55641] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-55642] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-55881] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-55916] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-56368] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56369] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-56372] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-56531] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56532] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56533] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56534] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56535] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56536] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-56537] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56538] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56539] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56540] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-56541] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56542] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-56543] = "cpe-stable-backport: Backported in 6.6.64"
+
+# CVE-2024-56544 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-56545] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56546] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56547] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56548] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56549] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-56550] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56551] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56552] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-56553] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56554] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56555] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56556] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56557] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56558] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56559] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-56560] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56561] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56562] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56563] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56564] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56565] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56566] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56567] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56568] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56569] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56570] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56572] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56573] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56574] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56575] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56576] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56577] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56578] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56579] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56580] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-56581] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56582] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-56583] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56584] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56585] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56586] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56587] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56588] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-56589] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56590] = "cpe-stable-backport: Backported in 6.6.66"
+
+# CVE-2024-56591 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-56592] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56593] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56594] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56595] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56596] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56597] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56598] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56599] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-56600] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56601] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56602] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56603] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56604] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56605] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56606] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56607] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-56608] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2024-56609] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-56610] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56611] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56612] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56613] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56614] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56615] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56616] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56617] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56618] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56619] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56620] = "cpe-stable-backport: Backported in 6.6.86"
+
+CVE_STATUS[CVE-2024-56621] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-56622] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56623] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56624] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-56625] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56626] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56627] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56628] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56629] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56630] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56631] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56632] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-56633] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56634] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56635] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56636] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56637] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56638] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56639] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56640] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56641] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56642] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56643] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56644] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56645] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56646] = "fixed-version: only affects 6.9 onwards"
+
+# CVE-2024-56647 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-56648] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56649] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56650] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56651] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56652] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-56653] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56654] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56655] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56656] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-56657] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56658] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56659] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56660] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56661] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56662] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56663] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56664] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56665] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56666] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56667] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56668] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56669] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56670] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56671] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56672] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56673] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-56674] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-56675] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56676] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56677] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56678] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56679] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56680] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56681] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56682] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56683] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56684] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-56685] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-56687] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56688] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56689] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56690] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56691] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56692] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56693] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56694] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56695] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56696] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-56697] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-56698] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56699] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-56700] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56701] = "cpe-stable-backport: Backported in 6.6.64"
+
+# CVE-2024-56702 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-56703] = "cpe-stable-backport: Backported in 6.6.75"
+
+CVE_STATUS[CVE-2024-56704] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56705] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56706] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56707] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56708] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56709] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-56710] = "cpe-stable-backport: Backported in 6.6.69"
+
+CVE_STATUS[CVE-2024-56711] = "fixed-version: only affects 6.11 onwards"
+
+# CVE-2024-56712 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-56713] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56714] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-56715] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-56716] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-56717] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-56718] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-56719] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-56720] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56721] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56722] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56723] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56724] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56725] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56726] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56727] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56728] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56729] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56730] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56739] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56740] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2024-56742 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-56743] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56744] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56745] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56746] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56747] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56748] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56749] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56750] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56751] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56752] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56753] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-56754] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56755] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56756] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56757] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-56758] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2024-56759] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-56760] = "cpe-stable-backport: Backported in 6.6.69"
+
+CVE_STATUS[CVE-2024-56761] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-56763] = "cpe-stable-backport: Backported in 6.6.69"
+
+CVE_STATUS[CVE-2024-56764] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-56765] = "cpe-stable-backport: Backported in 6.6.69"
+
+CVE_STATUS[CVE-2024-56766] = "cpe-stable-backport: Backported in 6.6.69"
+
+CVE_STATUS[CVE-2024-56767] = "cpe-stable-backport: Backported in 6.6.69"
+
+CVE_STATUS[CVE-2024-56768] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-56769] = "cpe-stable-backport: Backported in 6.6.69"
+
+CVE_STATUS[CVE-2024-56770] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-56771] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-56772] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-56773] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-56774] = "cpe-stable-backport: Backported in 6.6.64"
+
+# CVE-2024-56775 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-56776] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56777] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56778] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56779] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56780] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-56782] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-56783] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56784] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-56785] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56787] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-56788] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57791] = "cpe-stable-backport: Backported in 6.6.68"
+
+CVE_STATUS[CVE-2024-57792] = "cpe-stable-backport: Backported in 6.6.69"
+
+CVE_STATUS[CVE-2024-57793] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-57795] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2024-57798] = "cpe-stable-backport: Backported in 6.6.69"
+
+CVE_STATUS[CVE-2024-57799] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-57800] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57801] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57802] = "cpe-stable-backport: Backported in 6.6.70"
+
+# CVE-2024-57804 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-57805] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57806] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-57807] = "cpe-stable-backport: Backported in 6.6.69"
+
+# CVE-2024-57809 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-57834] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2024-57838] = "cpe-stable-backport: Backported in 6.6.64"
+
+CVE_STATUS[CVE-2024-57839] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-57841] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57843] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-57844] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57849] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-57850] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-57852] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2024-57857 needs backporting (fixed from 6.13)
+
+# CVE-2024-57872 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2024-57874] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-57875] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-57876] = "cpe-stable-backport: Backported in 6.6.66"
+
+CVE_STATUS[CVE-2024-57877] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57878] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-57879] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-57880] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-57881] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-57882] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57883] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57884] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57885] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57886] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-57887] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57888] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57889] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57890] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57891] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57892] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57893] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57895] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57896] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57897] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57898] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57899] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57900] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57901] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57902] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57903] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57904] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57905] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-57906] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57907] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57908] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57909] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57910] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57911] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57912] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57913] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57914] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57916] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57917] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57918] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-57919] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-57921] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-57922] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57923] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57924] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2024-57925] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57926] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57927] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57928] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57929] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57930] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57931] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57932] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57933] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57934] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-57935] = "fixed-version: only affects 6.12.2 onwards"
+
+CVE_STATUS[CVE-2024-57936] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57938] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2024-57939] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57940] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57941] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57942] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57943] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57944] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-57945] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2024-57946] = "cpe-stable-backport: Backported in 6.6.69"
+
+CVE_STATUS[CVE-2024-57947] = "cpe-stable-backport: Backported in 6.6.44"
+
+CVE_STATUS[CVE-2024-57948] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2024-57949] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2024-57950] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-57951] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2024-57952] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-57953] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2024-57973] = "cpe-stable-backport: Backported in 6.6.76"
+
+# CVE-2024-57974 needs backporting (fixed from 6.14)
+
+# CVE-2024-57975 needs backporting (fixed from 6.14)
+
+# CVE-2024-57976 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2024-57977] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2024-57978] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-57979] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-57980] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-57981] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-57982] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2024-57983] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2024-57984] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-57985] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-57986] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-57987] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-57988] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-57989] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-57990] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-57991] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2024-57992] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2024-57993] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-57994] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2024-57995] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-57996] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-57997] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-57998] = "cpe-stable-backport: Backported in 6.6.76"
+
+# CVE-2024-57999 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2024-58000] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2024-58001] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58002] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2024-58003] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58004] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-58005] = "cpe-stable-backport: Backported in 6.6.78"
+
+# CVE-2024-58006 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2024-58007] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58008] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-58009] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58010] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58011] = "cpe-stable-backport: Backported in 6.6.78"
+
+# CVE-2024-58012 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2024-58013] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58014] = "cpe-stable-backport: Backported in 6.6.78"
+
+# CVE-2024-58015 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2024-58016] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58017] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58018] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-58019] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-58020] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2024-58021] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-58022] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2024-58034] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58042] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-58051] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58052] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58053] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58054] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58055] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58056] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58057] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-58058] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58059] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2024-58060] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-58061] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58062] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-58063] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58064] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2024-58065] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2024-58066] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2024-58067] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2024-58068] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58069] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58070] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58071] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58072] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2024-58073] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2024-58074] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-58075] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2024-58076] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58077] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58078] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58079] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58080] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58081] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2024-58082] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2024-58083] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58084] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-58085] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2024-58086] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2024-58087] = "cpe-stable-backport: Backported in 6.6.67"
+
+CVE_STATUS[CVE-2024-58088] = "cpe-stable-backport: Backported in 6.6.80"
+
+# CVE-2024-58089 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2024-58090] = "cpe-stable-backport: Backported in 6.6.81"
+
+CVE_STATUS[CVE-2024-58091] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2024-58092] = "fixed-version: only affects 6.8 onwards"
+
+# CVE-2024-58093 needs backporting (fixed from 6.15)
+
+# CVE-2024-58094 needs backporting (fixed from 6.15)
+
+# CVE-2024-58095 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2024-58096] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2024-58097] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2024-58098] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2024-58099] = "cpe-stable-backport: Backported in 6.6.59"
+
+CVE_STATUS[CVE-2024-58100] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2024-58237] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2024-58238] = "cpe-stable-backport: Backported in 6.6.49"
+
+CVE_STATUS[CVE-2024-58239] = "cpe-stable-backport: Backported in 6.6.19"
+
+CVE_STATUS[CVE-2024-58240] = "cpe-stable-backport: Backported in 6.6.21"
+
+CVE_STATUS[CVE-2024-58241] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-21629] = "cpe-stable-backport: Backported in 6.6.70"
+
+CVE_STATUS[CVE-2025-21631] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21632] = "cpe-stable-backport: Backported in 6.6.72"
+
+# CVE-2025-21634 needs backporting (fixed from 6.13)
+
+# CVE-2025-21635 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2025-21636] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21637] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21638] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21639] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21640] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21641] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21642] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21643] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-21644] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-21645] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21646] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21647] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21648] = "cpe-stable-backport: Backported in 6.6.72"
+
+# CVE-2025-21649 needs backporting (fixed from 6.13)
+
+# CVE-2025-21650 needs backporting (fixed from 6.13)
+
+# CVE-2025-21651 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2025-21652] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21653] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21654] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21655] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21656] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21657] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21658] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21659] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-21660] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21661] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-21662] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21663] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21664] = "cpe-stable-backport: Backported in 6.6.72"
+
+CVE_STATUS[CVE-2025-21665] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21666] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21667] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21668] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21669] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21670] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21671] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21672] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-21673] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21674] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21675] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21676] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21677] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-21678] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21679] = "fixed-version: only affects 6.12.5 onwards"
+
+CVE_STATUS[CVE-2025-21680] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21681] = "cpe-stable-backport: Backported in 6.6.74"
+
+# CVE-2025-21682 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2025-21683] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21684] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21685] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-21687] = "cpe-stable-backport: Backported in 6.6.75"
+
+CVE_STATUS[CVE-2025-21688] = "cpe-stable-backport: Backported in 6.6.75"
+
+CVE_STATUS[CVE-2025-21689] = "cpe-stable-backport: Backported in 6.6.75"
+
+CVE_STATUS[CVE-2025-21690] = "cpe-stable-backport: Backported in 6.6.75"
+
+CVE_STATUS[CVE-2025-21691] = "cpe-stable-backport: Backported in 6.6.75"
+
+CVE_STATUS[CVE-2025-21692] = "cpe-stable-backport: Backported in 6.6.75"
+
+# CVE-2025-21693 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2025-21694] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21695] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2025-21696 needs backporting (fixed from 6.13)
+
+CVE_STATUS[CVE-2025-21697] = "cpe-stable-backport: Backported in 6.6.74"
+
+CVE_STATUS[CVE-2025-21699] = "cpe-stable-backport: Backported in 6.6.75"
+
+CVE_STATUS[CVE-2025-21700] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21701] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21702] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21703] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21704] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21705] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21706] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21707] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21708] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21709] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-21710] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21711] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21712] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21713] = "fixed-version: only affects 6.11 onwards"
+
+# CVE-2025-21714 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21715] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21716] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21717] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21718] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21719] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21720] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21721] = "cpe-stable-backport: Backported in 6.6.80"
+
+# CVE-2025-21722 needs backporting (fixed from 6.14)
+
+# CVE-2025-21723 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21724] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21725] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21726] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21727] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21728] = "cpe-stable-backport: Backported in 6.6.76"
+
+# CVE-2025-21729 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21730] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21731] = "cpe-stable-backport: Backported in 6.6.76"
+
+# CVE-2025-21732 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21733] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21734] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21735] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21736] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21737] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-21738] = "cpe-stable-backport: Backported in 6.6.78"
+
+# CVE-2025-21739 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21741] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21742] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21743] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21744] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21745] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21746] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21747] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21748] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21749] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21750] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21751] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21752] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-21753] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21754] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21756] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21758] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21759] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21760] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21761] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21762] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21763] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21764] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21765] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21766] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21767] = "cpe-stable-backport: Backported in 6.6.79"
+
+# CVE-2025-21768 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21769] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21770] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-21771] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21772] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21773] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21774] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21775] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21776] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21777] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21778] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21779] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21780] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21781] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21782] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21783] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21784] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21785] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21786] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-21787] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21788] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-21789] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21790] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21791] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21792] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21793] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21794] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21795] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21796] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21797] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21798] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-21799] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21800] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2025-21801 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21802] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21803] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21804] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21805] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21806] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21807] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-21808] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21809] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-21810] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21811] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21812] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21813] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21814] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21815] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-21816] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-21817] = "fixed-version: only affects 6.13.2 onwards"
+
+CVE_STATUS[CVE-2025-21819] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21820] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21821] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21822] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21823] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21824] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2025-21825 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21826] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21827] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-21828] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21829] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21830] = "cpe-stable-backport: Backported in 6.6.76"
+
+CVE_STATUS[CVE-2025-21831] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21832] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-21833] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-21834] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-21835] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21836] = "cpe-stable-backport: Backported in 6.6.79"
+
+CVE_STATUS[CVE-2025-21838] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21839] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-21840] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21841] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21842] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21843] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21844] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21845] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21846] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21847] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21848] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21849] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-21850] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21851] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-21852] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-21853] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21854] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21855] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21856] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21857] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21858] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21859] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21860] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21861] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-21862] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21863] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21864] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21865] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21866] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21867] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21868] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-21869] = "fixed-version: only affects 6.7 onwards"
+
+# CVE-2025-21870 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21871] = "cpe-stable-backport: Backported in 6.6.80"
+
+CVE_STATUS[CVE-2025-21872] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21873] = "cpe-stable-backport: Backported in 6.6.81"
+
+CVE_STATUS[CVE-2025-21874] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-21875] = "cpe-stable-backport: Backported in 6.6.81"
+
+CVE_STATUS[CVE-2025-21876] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-21877] = "cpe-stable-backport: Backported in 6.6.81"
+
+CVE_STATUS[CVE-2025-21878] = "cpe-stable-backport: Backported in 6.6.81"
+
+CVE_STATUS[CVE-2025-21879] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21880] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-21881] = "cpe-stable-backport: Backported in 6.6.81"
+
+CVE_STATUS[CVE-2025-21882] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21883] = "cpe-stable-backport: Backported in 6.6.81"
+
+CVE_STATUS[CVE-2025-21884] = "cpe-stable-backport: Backported in 6.6.103"
+
+# CVE-2025-21885 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21886] = "fixed-version: only affects 6.12.13 onwards"
+
+CVE_STATUS[CVE-2025-21887] = "cpe-stable-backport: Backported in 6.6.81"
+
+# CVE-2025-21888 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21889] = "cpe-stable-backport: Backported in 6.6.81"
+
+CVE_STATUS[CVE-2025-21890] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-21891] = "cpe-stable-backport: Backported in 6.6.81"
+
+# CVE-2025-21892 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21893] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-21894] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21895] = "cpe-stable-backport: Backported in 6.6.81"
+
+CVE_STATUS[CVE-2025-21896] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21897] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21898] = "cpe-stable-backport: Backported in 6.6.81"
+
+CVE_STATUS[CVE-2025-21899] = "cpe-stable-backport: Backported in 6.6.81"
+
+CVE_STATUS[CVE-2025-21900] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-21901] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21902] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21903] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-21904] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21905] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21906] = "fixed-version: only affects 6.9 onwards"
+
+# CVE-2025-21907 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21908] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21909] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21910] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21911] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-21912] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21913] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21914] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21915] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21916] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21917] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21918] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21919] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21920] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21921] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21922] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21923] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21924] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21925] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21926] = "cpe-stable-backport: Backported in 6.6.83"
+
+# CVE-2025-21927 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21928] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21929] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-21930] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-21931] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-21932] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21933] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21934] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21935] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21936] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21937] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21938] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21939] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-21940] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21941] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21942] = "fixed-version: only affects 6.13.2 onwards"
+
+CVE_STATUS[CVE-2025-21943] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21944] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21945] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21946] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21947] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21948] = "cpe-stable-backport: Backported in 6.6.83"
+
+# CVE-2025-21949 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21950] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21951] = "cpe-stable-backport: Backported in 6.6.83"
+
+CVE_STATUS[CVE-2025-21952] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21953] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-21954] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21955] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21956] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21957] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21958] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21959] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21960] = "cpe-stable-backport: Backported in 6.6.84"
+
+# CVE-2025-21961 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21962] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21963] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21964] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21965] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21966] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21967] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21968] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21969] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21970] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21971] = "cpe-stable-backport: Backported in 6.6.84"
+
+# CVE-2025-21972 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21973] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-21974] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-21975] = "cpe-stable-backport: Backported in 6.6.84"
+
+# CVE-2025-21976 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21977] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-21978] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21979] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21980] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21981] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21982] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-21983] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21984] = "fixed-version: only affects 6.8 onwards"
+
+# CVE-2025-21985 needs backporting (fixed from 6.14)
+
+CVE_STATUS[CVE-2025-21986] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21987] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-21988] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-21989] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-21990] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-21991] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21992] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21993] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-21994] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-21995] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-21996] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-21997] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-21998] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-21999] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-22000] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-22001] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-22002] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-22003] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-22004] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-22005] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-22006] = "fixed-version: only affects 6.12.14 onwards"
+
+CVE_STATUS[CVE-2025-22007] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-22008] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-22009] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-22010] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-22011] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-22012] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-22013] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-22014] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-22015] = "cpe-stable-backport: Backported in 6.6.85"
+
+CVE_STATUS[CVE-2025-22016] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-22017] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-22018] = "cpe-stable-backport: Backported in 6.6.86"
+
+CVE_STATUS[CVE-2025-22019] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-22020] = "cpe-stable-backport: Backported in 6.6.86"
+
+CVE_STATUS[CVE-2025-22021] = "cpe-stable-backport: Backported in 6.6.86"
+
+CVE_STATUS[CVE-2025-22022] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-22023] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-22024] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-22025] = "cpe-stable-backport: Backported in 6.6.87"
+
+# CVE-2025-22026 may need backporting (fixed from 6.6.125)
+
+CVE_STATUS[CVE-2025-22027] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22028] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-22030] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-22031] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-22032] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-22033] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22034] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-22035] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22036] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-22037] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-22038] = "cpe-stable-backport: Backported in 6.6.87"
+
+# CVE-2025-22039 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-22040] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22041] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22042] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22043] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22044] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22045] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22046] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-22047] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22048] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22049] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22050] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22051] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-22052] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-22053] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22054] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22055] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22056] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22057] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22058] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22059] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-22060] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22061] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-22062] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-22063] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22064] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22065] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-22066] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22067] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-22068] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-22069] = "fixed-version: only affects 6.14 onwards"
+
+# CVE-2025-22070 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-22071] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22072] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22073] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22074] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22075] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22076] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-22077] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-22078] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-22079] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22080] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22081] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22082] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-22083] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22084] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-22085] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-22086] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22087] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-22088] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22089] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22090] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22091] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-22092] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-22093] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22094] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-22095] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22096] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-22097] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-22098] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-22099] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-22100] = "fixed-version: only affects 6.13 onwards"
+
+# CVE-2025-22101 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-22102] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-22103] = "cpe-stable-backport: Backported in 6.6.117"
+
+# CVE-2025-22104 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-22105] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-22106] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-22107] = "cpe-stable-backport: Backported in 6.6.120"
+
+# CVE-2025-22108 needs backporting (fixed from 6.15)
+
+# CVE-2025-22109 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-22110] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-22111] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-22112] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2025-22113 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards"
+
+# CVE-2025-22115 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-22116] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-22117] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-22118] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-22119] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-22120] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-22121] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-22122] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-22123] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-22124] = "fixed-version: only affects 6.11 onwards"
+
+# CVE-2025-22125 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-22126] = "cpe-stable-backport: Backported in 6.6.88"
+
+# CVE-2025-22127 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-22128] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-23129] = "fixed-version: only affects 6.7 onwards"
+
+# CVE-2025-23130 needs backporting (fixed from 6.15)
+
+# CVE-2025-23131 needs backporting (fixed from 6.15)
+
+# CVE-2025-23132 needs backporting (fixed from 6.15)
+
+# CVE-2025-23133 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-23134] = "fixed-version: only affects 6.9 onwards"
+
+# CVE-2025-23135 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-23136] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-23137] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-23138] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-23140] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23141] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23142] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23143] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-23144] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23145] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23146] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23147] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23148] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23149] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23150] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23151] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23152] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-23153] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-23154] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-23155] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-23156] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23157] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23158] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23159] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23160] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23161] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-23162] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-23163] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37738] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37739] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37740] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37741] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37742] = "cpe-stable-backport: Backported in 6.6.88"
+
+# CVE-2025-37743 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-37744] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-37745] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-37746] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-37747] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-37748] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37749] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37750] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-37751] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-37752] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37754] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37755] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37756] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37757] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37758] = "cpe-stable-backport: Backported in 6.6.88"
+
+# CVE-2025-37759 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-37760] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-37761] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-37762] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-37763] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-37764] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-37765] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37766] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37767] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37768] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37769] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37770] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37771] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37772] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37773] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37774] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-37775] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37776] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37777] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-37778] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37779] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-37780] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37781] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37783] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-37784] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37785] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-37786] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37787] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37788] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37789] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37790] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37791] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-37792] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37793] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37794] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37796] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37797] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37798] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37799] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37800] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37801] = "cpe-stable-backport: Backported in 6.6.89"
+
+# CVE-2025-37802 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-37803] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37805] = "cpe-stable-backport: Backported in 6.6.89"
+
+# CVE-2025-37806 needs backporting (fixed from 6.15)
+
+# CVE-2025-37807 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-37808] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37809] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-37810] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37811] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37812] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37813] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37814] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-37815] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37816] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-37817] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37818] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37819] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37820] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37821] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-37822] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2025-37823] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37824] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37825] = "fixed-version: only affects 6.14 onwards"
+
+# CVE-2025-37826 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-37827] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-37828] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37829] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37830] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37831] = "cpe-stable-backport: Backported in 6.6.89"
+
+# CVE-2025-37833 needs backporting (fixed from 6.15)
+
+# CVE-2025-37834 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-37836] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37837] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-37838] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37839] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37840] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37841] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37842] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-37843] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-37844] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37845] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-37846] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-37847] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-37848] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-37849] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37850] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37851] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37852] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37853] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37854] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37855] = "fixed-version: only affects 6.14 onwards"
+
+# CVE-2025-37856 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-37857] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37858] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37859] = "cpe-stable-backport: Backported in 6.6.88"
+
+# CVE-2025-37860 needs backporting (fixed from 6.15)
+
+# CVE-2025-37861 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-37862] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37863] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37864] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37865] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37866] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-37867] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37868] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-37869] = "fixed-version: only affects 6.8 onwards"
+
+# CVE-2025-37870 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-37871] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37872] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-37873] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-37874] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37875] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37876] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-37877] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-37878] = "fixed-version: only affects 6.12.24 onwards"
+
+CVE_STATUS[CVE-2025-37879] = "cpe-stable-backport: Backported in 6.6.89"
+
+# CVE-2025-37880 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-37881] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37882] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-37883] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37884] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-37885] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37886] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37887] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37888] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-37889] = "cpe-stable-backport: Backported in 6.6.84"
+
+CVE_STATUS[CVE-2025-37890] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37891] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37892] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37893] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-37894] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-37895] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-37896] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-37897] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37898] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-37899] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-37900] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-37901] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37903] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37904] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-37905] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37906] = "fixed-version: only affects 6.7 onwards"
+
+# CVE-2025-37907 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-37908] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-37909] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37910] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-37911] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37912] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37913] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37914] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37915] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37916] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37917] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37918] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37919] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-37920] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2025-37921] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37922] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37923] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37924] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37925] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-37926] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-37927] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37928] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37929] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37930] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37931] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-37932] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37933] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37934] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-37935] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37936] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37937] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-37938] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37939] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-37940] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37941] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-37943] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37944] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37945] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-37946] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-37947] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37948] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37949] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37950] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-37951] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37952] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37953] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37954] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37955] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-37956] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37957] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-37958] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-37959] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37960] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-37961] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37962] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37963] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37964] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37965] = "fixed-version: only affects 6.12.25 onwards"
+
+CVE_STATUS[CVE-2025-37966] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-37967] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-37968] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-37969] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37970] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37971] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-37972] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37973] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37974] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-37975] = "fixed-version: only affects 6.8 onwards"
+
+# CVE-2025-37977 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-37978] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-37979] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37980] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37981] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-37982] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-37983] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37984] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-37985] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37986] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-37987] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-37988] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37989] = "cpe-stable-backport: Backported in 6.6.89"
+
+CVE_STATUS[CVE-2025-37990] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37991] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-37992] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-37993] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-37994] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37995] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37996] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-37997] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37998] = "cpe-stable-backport: Backported in 6.6.91"
+
+CVE_STATUS[CVE-2025-37999] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38000] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38001] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38002] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38003] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38004] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38005] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38006] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38007] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38008] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38009] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38010] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38011] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-38012] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38013] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38014] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38015] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38016] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38017] = "fixed-version: only affects 6.14.4 onwards"
+
+CVE_STATUS[CVE-2025-38018] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38019] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38020] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38021] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38022] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-38023] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38024] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38025] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38027] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38028] = "fixed-version: only affects 6.14 onwards"
+
+# CVE-2025-38029 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-38031] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38032] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38033] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38034] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38035] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38036] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38037] = "cpe-stable-backport: Backported in 6.6.93"
+
+# CVE-2025-38038 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-38039] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38040] = "cpe-stable-backport: Backported in 6.6.93"
+
+# CVE-2025-38041 needs backporting (fixed from 6.15)
+
+# CVE-2025-38042 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-38043] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38044] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38045] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38047] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-38048] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38049] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-38050] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38051] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38052] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38053] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38054] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-38055] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38056] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38057] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-38058] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38059] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38060] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38061] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38062] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38063] = "cpe-stable-backport: Backported in 6.6.93"
+
+# CVE-2025-38064 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-38065] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38066] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38067] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38068] = "cpe-stable-backport: Backported in 6.6.93"
+
+# CVE-2025-38069 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-38070] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38071] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38072] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38074] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38075] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38076] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38077] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38078] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38079] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38080] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38081] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38082] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38083] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38084] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38085] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38086] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38087] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38088] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38089] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38090] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38091] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38092] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38093] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38094] = "cpe-stable-backport: Backported in 6.6.92"
+
+CVE_STATUS[CVE-2025-38095] = "cpe-stable-backport: Backported in 6.6.92"
+
+# CVE-2025-38096 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-38097] = "cpe-stable-backport: Backported in 6.6.93"
+
+CVE_STATUS[CVE-2025-38098] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38099] = "fixed-version: only affects 6.12.24 onwards"
+
+CVE_STATUS[CVE-2025-38100] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38101] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38102] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38103] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38104] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2025-38105] = "cpe-stable-backport: Backported in 6.6.111"
+
+CVE_STATUS[CVE-2025-38106] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-38107] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38108] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38109] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38110] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38111] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38112] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38113] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38114] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38115] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38116] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38117] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38118] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38119] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38120] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38121] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38122] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38123] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38124] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38125] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-38126] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38127] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38128] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38129] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-38130] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38131] = "cpe-stable-backport: Backported in 6.6.94"
+
+# CVE-2025-38132 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38133] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38134] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38135] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38136] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38137] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38138] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38139] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2025-38140 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38141] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-38142] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38143] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38144] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38145] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38146] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38147] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38148] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38149] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38150] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38151] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38152] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-38153] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38154] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38155] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38156] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38157] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38158] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38159] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38160] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38161] = "cpe-stable-backport: Backported in 6.6.94"
+
+# CVE-2025-38162 may need backporting (fixed from 6.6.125)
+
+CVE_STATUS[CVE-2025-38163] = "cpe-stable-backport: Backported in 6.6.94"
+
+# CVE-2025-38164 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2025-38165] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38166] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38167] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38168] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38169] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-38170] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38171] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38172] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38173] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38174] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38175] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38176] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38177] = "cpe-stable-backport: Backported in 6.6.90"
+
+CVE_STATUS[CVE-2025-38179] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38180] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38181] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38182] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38183] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38184] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38185] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38186] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-38187] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38188] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38189] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38190] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38191] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38192] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38193] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38194] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38195] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38196] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38197] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38198] = "cpe-stable-backport: Backported in 6.6.95"
+
+# CVE-2025-38199 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38200] = "cpe-stable-backport: Backported in 6.6.95"
+
+# CVE-2025-38201 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2025-38202] = "cpe-stable-backport: Backported in 6.6.95"
+
+# CVE-2025-38203 needs backporting (fixed from 6.16)
+
+# CVE-2025-38204 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38205] = "fixed-version: only affects 6.7 onwards"
+
+# CVE-2025-38206 needs backporting (fixed from 6.16)
+
+# CVE-2025-38207 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38208] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38209] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38210] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38211] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38212] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38214] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38215] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38216] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38217] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38218] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38219] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38220] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38221] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38222] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38223] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38224] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38225] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38226] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38227] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38228] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38229] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38230] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38231] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38232] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-38233] = "fixed-version: only affects 6.13 onwards"
+
+# CVE-2025-38234 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2025-38235] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38236] = "cpe-stable-backport: Backported in 6.6.96"
+
+# CVE-2025-38237 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38238] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38239] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38240] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-38241] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38242] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38243] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38244] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38245] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38246] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38247] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38248] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-38249] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38250] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38251] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38252] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38253] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38254] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38255] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38256] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38257] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38258] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38259] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38260] = "cpe-stable-backport: Backported in 6.6.96"
+
+# CVE-2025-38261 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38262] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38263] = "cpe-stable-backport: Backported in 6.6.96"
+
+# CVE-2025-38264 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38265] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38266] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38267] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-38268] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-38269] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38270] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-38271] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2025-38272 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38273] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38274] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38275] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38276] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38277] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38278] = "cpe-stable-backport: Backported in 6.6.94"
+
+# CVE-2025-38279 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38280] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38281] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38282] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38283] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38284] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38285] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38286] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38287] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38288] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38289] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38290] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38291] = "fixed-version: only affects 6.13 onwards"
+
+# CVE-2025-38292 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38293] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38294] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38295] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38296] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38297] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-38298] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38299] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38300] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38301] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-38302] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2025-38303 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38304] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38305] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38306] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38307] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38308] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38309] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38310] = "cpe-stable-backport: Backported in 6.6.94"
+
+# CVE-2025-38311 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38312] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38313] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38314] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38315] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38316] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38317] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38318] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38319] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38320] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38321] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38322] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-38323] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38324] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38325] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38326] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38327] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38328] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38329] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38330] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38331] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38332] = "cpe-stable-backport: Backported in 6.6.95"
+
+# CVE-2025-38333 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38334] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38335] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-38336] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38337] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38338] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38339] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38340] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38341] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38342] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38343] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38344] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38345] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38346] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38347] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38348] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38350] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38351] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38352] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38353] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38354] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38355] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38356] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38357] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38358] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2025-38359 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38360] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38361] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-38362] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38363] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38364] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38365] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38366] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38367] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38368] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38369] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38370] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38371] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38372] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38373] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38374] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38375] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38376] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38377] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38378] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38379] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38381] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38382] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38383] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-38384] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38385] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38386] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38387] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38388] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38389] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38390] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38391] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38392] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38393] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38394] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38395] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38396] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38397] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38398] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38399] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38400] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38401] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38402] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38403] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38404] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38405] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38406] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38407] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38408] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-38409] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38410] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38411] = "fixed-version: only affects 6.15.3 onwards"
+
+CVE_STATUS[CVE-2025-38412] = "cpe-stable-backport: Backported in 6.6.97"
+
+CVE_STATUS[CVE-2025-38413] = "fixed-version: only affects 6.11 onwards"
+
+# CVE-2025-38414 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38415] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38416] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38417] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38418] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38419] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38420] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38421] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38422] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38423] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38424] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38425] = "cpe-stable-backport: Backported in 6.6.95"
+
+# CVE-2025-38426 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2025-38427] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38428] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38429] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38430] = "cpe-stable-backport: Backported in 6.6.95"
+
+CVE_STATUS[CVE-2025-38431] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38432] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38433] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38434] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-38435] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38436] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-38437] = "cpe-stable-backport: Backported in 6.6.99"
+
+# CVE-2025-38438 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38439] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38440] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-38441] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38442] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38443] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38444] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38445] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38446] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-38447] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38448] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38449] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38450] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38451] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38452] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38453] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38454] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38455] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38456] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38457] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38458] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38459] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38460] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38461] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38462] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38463] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38464] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38465] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38466] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38467] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38468] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38469] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38470] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38471] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38472] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38473] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38474] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38475] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38476] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38477] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38478] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38479] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38480] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38481] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38482] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38483] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38484] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38485] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38486] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38487] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38488] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38489] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38490] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38491] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-38492] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38493] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38494] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38495] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38496] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38497] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38498] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-38499] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38500] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-38501] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38502] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-38503] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38504] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38505] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38506] = "fixed-version: only affects 6.8 onwards"
+
+# CVE-2025-38507 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38508] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38509] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38510] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38511] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38512] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38513] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38514] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38515] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38516] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38517] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-38518] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38519] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38520] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-38521] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38522] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38523] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38524] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38525] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38526] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38527] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38528] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38529] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38530] = "cpe-stable-backport: Backported in 6.6.100"
+
+# CVE-2025-38531 needs backporting (fixed from 6.16)
+
+CVE_STATUS[CVE-2025-38532] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38533] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38534] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38535] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38536] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38537] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38538] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38539] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38540] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38541] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-38542] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38543] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38544] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38545] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-38546] = "cpe-stable-backport: Backported in 6.6.99"
+
+CVE_STATUS[CVE-2025-38547] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38548] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38549] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38550] = "cpe-stable-backport: Backported in 6.6.100"
+
+CVE_STATUS[CVE-2025-38551] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38552] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-38553] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38554] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38555] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38556] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-38557] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38558] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38559] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38560] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38561] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38562] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38563] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38564] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38565] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38566] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38567] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38568] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38569] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38570] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38571] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38572] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38573] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38574] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-38576] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38577] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38578] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38579] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38580] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38581] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38582] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38583] = "cpe-stable-backport: Backported in 6.6.102"
+
+# CVE-2025-38584 needs backporting (fixed from 6.17)
+
+# CVE-2025-38585 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-38586] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38587] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38588] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38589] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38590] = "cpe-stable-backport: Backported in 6.6.102"
+
+# CVE-2025-38591 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-38592] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38593] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-38594] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2025-38595 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-38596] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2025-38597 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-38598] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-38599] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38600] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-38601] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38602] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38604] = "cpe-stable-backport: Backported in 6.6.102"
+
+# CVE-2025-38605 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-38606] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38607] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38608] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38609] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38610] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38612] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38613] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38614] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38615] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38616] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38617] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38618] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38619] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38620] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-38621] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-38622] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38623] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38624] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38625] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38626] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38627] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-38628] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38629] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38630] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38631] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-38632] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38633] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-38634] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38635] = "cpe-stable-backport: Backported in 6.6.102"
+
+# CVE-2025-38636 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-38637] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-38638] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-38639] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38640] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38641] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-38642] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38643] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-38644] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38645] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38646] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38647] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-38648] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38649] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38650] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38651] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38652] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38653] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-38654] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38655] = "fixed-version: only affects 6.13 onwards"
+
+# CVE-2025-38656 has no known resolution
+
+CVE_STATUS[CVE-2025-38657] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-38658] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38659] = "cpe-stable-backport: Backported in 6.6.102"
+
+# CVE-2025-38660 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-38661] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38662] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38663] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-38664] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-38665] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-38666] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-38667] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38668] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-38669] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38670] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-38671] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-38672] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38673] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38674] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38675] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38676] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38677] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38678] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-38679] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38680] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38681] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38682] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-38683] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38684] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38685] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38686] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-38687] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38688] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38689] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-38690] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-38691] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38692] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38693] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38694] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38695] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38696] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38697] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38698] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38699] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38700] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38701] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38702] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38703] = "fixed-version: only affects 6.8 onwards"
+
+# CVE-2025-38704 may need backporting (fixed from 6.6.130)
+
+# CVE-2025-38705 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-38706] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38707] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38708] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38709] = "cpe-stable-backport: Backported in 6.6.109"
+
+# CVE-2025-38710 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-38711] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38712] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38713] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38714] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38715] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38716] = "cpe-stable-backport: Backported in 6.6.103"
+
+# CVE-2025-38717 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-38718] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38719] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-38720] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-38721] = "cpe-stable-backport: Backported in 6.6.103"
+
+# CVE-2025-38722 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-38723] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38724] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38725] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38726] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-38727] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38728] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38729] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38730] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38731] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-38732] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38733] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-38734] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38735] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-38736] = "fixed-version: only affects 6.12.43 onwards"
+
+CVE_STATUS[CVE-2025-38737] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39673] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39674] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39675] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39676] = "cpe-stable-backport: Backported in 6.6.103"
+
+# CVE-2025-39677 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39678] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-39679] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39680] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-39681] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39682] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39683] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39684] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39685] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39686] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39687] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39688] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39689] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39690] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39691] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39692] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39693] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39694] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39695] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-39696] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39697] = "cpe-stable-backport: Backported in 6.6.104"
+
+CVE_STATUS[CVE-2025-39698] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-39699] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-39700] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-39701] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39702] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39703] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39704] = "fixed-version: only affects 6.13 onwards"
+
+# CVE-2025-39705 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39706] = "cpe-stable-backport: Backported in 6.6.103"
+
+# CVE-2025-39707 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39708] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39709] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39710] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39711] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39712] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-39713] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39714] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39715] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39716] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39717] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39718] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39719] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39720] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39721] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39722] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-39723] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-39724] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39725] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39726] = "cpe-stable-backport: Backported in 6.6.101"
+
+CVE_STATUS[CVE-2025-39727] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39728] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-39729] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39730] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-39731] = "cpe-stable-backport: Backported in 6.6.102"
+
+# CVE-2025-39732 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39733] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39734] = "cpe-stable-backport: Backported in 6.6.102"
+
+CVE_STATUS[CVE-2025-39735] = "cpe-stable-backport: Backported in 6.6.87"
+
+CVE_STATUS[CVE-2025-39736] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39737] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39738] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39739] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39740] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39741] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39742] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39743] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39744] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39745] = "fixed-version: only affects 6.14 onwards"
+
+# CVE-2025-39746 needs backporting (fixed from 6.17)
+
+# CVE-2025-39747 needs backporting (fixed from 6.17)
+
+# CVE-2025-39748 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2025-39749] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39750] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39752] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39753] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2025-39754 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39755] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-39756] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39757] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39758] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39759] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39760] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39761] = "cpe-stable-backport: Backported in 6.6.103"
+
+# CVE-2025-39762 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39763] = "cpe-stable-backport: Backported in 6.6.103"
+
+# CVE-2025-39764 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2025-39765] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39766] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39767] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39768] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39769] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39770] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39771] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39772] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39773] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39774] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-39775] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-39776] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39777] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39778] = "fixed-version: only affects 6.11 onwards"
+
+# CVE-2025-39779 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39780] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39781] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39782] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39783] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39784] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-39785] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39786] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-39787] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39788] = "cpe-stable-backport: Backported in 6.6.103"
+
+# CVE-2025-39789 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39790] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39791] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-39792] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-39793] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-39794] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39795] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39796] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39797] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39798] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39800] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39801] = "cpe-stable-backport: Backported in 6.6.103"
+
+CVE_STATUS[CVE-2025-39802] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39803] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-39804] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39805] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-39806] = "cpe-stable-backport: Backported in 6.6.104"
+
+CVE_STATUS[CVE-2025-39807] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39808] = "cpe-stable-backport: Backported in 6.6.104"
+
+CVE_STATUS[CVE-2025-39809] = "fixed-version: only affects 6.14 onwards"
+
+# CVE-2025-39810 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39811] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-39812] = "cpe-stable-backport: Backported in 6.6.104"
+
+CVE_STATUS[CVE-2025-39813] = "cpe-stable-backport: Backported in 6.6.104"
+
+CVE_STATUS[CVE-2025-39814] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39815] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-39816] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39817] = "cpe-stable-backport: Backported in 6.6.104"
+
+CVE_STATUS[CVE-2025-39818] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-39819] = "cpe-stable-backport: Backported in 6.6.104"
+
+CVE_STATUS[CVE-2025-39820] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39821] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39822] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39823] = "cpe-stable-backport: Backported in 6.6.104"
+
+CVE_STATUS[CVE-2025-39824] = "cpe-stable-backport: Backported in 6.6.104"
+
+CVE_STATUS[CVE-2025-39825] = "cpe-stable-backport: Backported in 6.6.104"
+
+CVE_STATUS[CVE-2025-39826] = "cpe-stable-backport: Backported in 6.6.104"
+
+CVE_STATUS[CVE-2025-39827] = "cpe-stable-backport: Backported in 6.6.104"
+
+CVE_STATUS[CVE-2025-39828] = "cpe-stable-backport: Backported in 6.6.104"
+
+# CVE-2025-39829 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39830] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39831] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-39832] = "cpe-stable-backport: Backported in 6.6.104"
+
+# CVE-2025-39833 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39834] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39835] = "cpe-stable-backport: Backported in 6.6.104"
+
+CVE_STATUS[CVE-2025-39836] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-39837] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39838] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39839] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39840] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-39841] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39842] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39843] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39844] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39845] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39846] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39847] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39848] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39849] = "cpe-stable-backport: Backported in 6.6.105"
+
+# CVE-2025-39850 needs backporting (fixed from 6.17)
+
+# CVE-2025-39851 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39852] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-39853] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39854] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-39855] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39856] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39857] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39858] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2025-39859 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39860] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39861] = "cpe-stable-backport: Backported in 6.6.105"
+
+# CVE-2025-39862 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39863] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39864] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39865] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39866] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39868] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39869] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39870] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39871] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39872] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39873] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39874] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39875] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-39876] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39877] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39878] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39879] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39880] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39881] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39882] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39883] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39884] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-39885] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39886] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39887] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39888] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39889] = "cpe-stable-backport: Backported in 6.6.88"
+
+CVE_STATUS[CVE-2025-39890] = "cpe-stable-backport: Backported in 6.6.94"
+
+CVE_STATUS[CVE-2025-39891] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39892] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39893] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39894] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39895] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39896] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-39897] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-39899] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-39900] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2025-39901 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39902] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39903] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39904] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39905] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-39906] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39907] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39908] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39909] = "cpe-stable-backport: Backported in 6.6.107"
+
+# CVE-2025-39910 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39911] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39912] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39913] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39914] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39915] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-39916] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39917] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-39918] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39919] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39920] = "cpe-stable-backport: Backported in 6.6.105"
+
+CVE_STATUS[CVE-2025-39921] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-39922] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-39923] = "cpe-stable-backport: Backported in 6.6.107"
+
+CVE_STATUS[CVE-2025-39924] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2025-39925 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39926] = "fixed-version: only affects 6.9 onwards"
+
+# CVE-2025-39927 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39928] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-39929] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39930] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-39931] = "cpe-stable-backport: Backported in 6.6.108"
+
+# CVE-2025-39932 needs backporting (fixed from 6.17)
+
+# CVE-2025-39933 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39934] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39935] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-39936] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39937] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39938] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39939] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2025-39940 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39941] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-39942] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39943] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39944] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39945] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39946] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39947] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39948] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-39949] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39950] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-39951] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39952] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39953] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39954] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39955] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39956] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-39957] = "cpe-stable-backport: Backported in 6.6.108"
+
+# CVE-2025-39958 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39959] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39960] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39961] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39962] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39963] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-39964] = "cpe-stable-backport: Backported in 6.6.108"
+
+CVE_STATUS[CVE-2025-39965] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39966] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-39967] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39968] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39969] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39970] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39971] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39972] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39973] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39974] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39975] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39976] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39977] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39978] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39979] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-39980] = "cpe-stable-backport: Backported in 6.6.109"
+
+# CVE-2025-39981 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39982] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39983] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-39984] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-39985] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39986] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39987] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39988] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-39989] = "cpe-stable-backport: Backported in 6.6.89"
+
+# CVE-2025-39990 needs backporting (fixed from 6.17)
+
+CVE_STATUS[CVE-2025-39991] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-39992] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-39993] = "cpe-stable-backport: Backported in 6.6.110"
+
+CVE_STATUS[CVE-2025-39994] = "cpe-stable-backport: Backported in 6.6.111"
+
+CVE_STATUS[CVE-2025-39995] = "cpe-stable-backport: Backported in 6.6.111"
+
+CVE_STATUS[CVE-2025-39996] = "cpe-stable-backport: Backported in 6.6.110"
+
+CVE_STATUS[CVE-2025-39997] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-39998] = "cpe-stable-backport: Backported in 6.6.110"
+
+CVE_STATUS[CVE-2025-39999] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2025-40000 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40001] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40002] = "fixed-version: only affects 6.14 onwards"
+
+# CVE-2025-40003 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40004] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2025-40005 may need backporting (fixed from 6.6.125)
+
+CVE_STATUS[CVE-2025-40006] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-40007] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40008] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-40009] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-40010] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-40011] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-40012] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-40013] = "cpe-stable-backport: Backported in 6.6.110"
+
+CVE_STATUS[CVE-2025-40014] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-40015] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40016] = "cpe-stable-backport: Backported in 6.6.110"
+
+CVE_STATUS[CVE-2025-40017] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40018] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40019] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40020] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-40021] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-40022] = "cpe-stable-backport: Backported in 6.6.109"
+
+CVE_STATUS[CVE-2025-40023] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40024] = "cpe-stable-backport: Backported in 6.6.109"
+
+# CVE-2025-40025 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40026] = "cpe-stable-backport: Backported in 6.6.111"
+
+CVE_STATUS[CVE-2025-40027] = "cpe-stable-backport: Backported in 6.6.111"
+
+CVE_STATUS[CVE-2025-40028] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-40029] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40030] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40031] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-40032] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40033] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40034] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40035] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40036] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40037] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-40038] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40039] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2025-40040] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40041] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40042] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40043] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40044] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40045] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-40046] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40047] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-40048] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40049] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40050] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40051] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40052] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40053] = "cpe-stable-backport: Backported in 6.6.112"
+
+# CVE-2025-40054 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40055] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40056] = "cpe-stable-backport: Backported in 6.6.112"
+
+# CVE-2025-40057 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40058] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-40059] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-40060] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40061] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40062] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40063] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2025-40064 needs backporting (fixed from 6.18)
+
+# CVE-2025-40065 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40066] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40067] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40068] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40069] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40070] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40071] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40072] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40073] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2025-40074 needs backporting (fixed from 6.18)
+
+# CVE-2025-40075 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40076] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40077] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40078] = "cpe-stable-backport: Backported in 6.6.112"
+
+# CVE-2025-40079 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40080] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40081] = "cpe-stable-backport: Backported in 6.6.112"
+
+# CVE-2025-40082 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2025-40083] = "cpe-stable-backport: Backported in 6.6.116"
+
+CVE_STATUS[CVE-2025-40084] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40085] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40086] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-40087] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40088] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40089] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40090] = "fixed-version: only affects 6.12.53 onwards"
+
+CVE_STATUS[CVE-2025-40091] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40092] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40093] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40094] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40095] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40096] = "cpe-stable-backport: Backported in 6.6.114"
+
+# CVE-2025-40097 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40098] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-40099] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40100] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40101] = "fixed-version: only affects 6.8 onwards"
+
+# CVE-2025-40102 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40103] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40104] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40105] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40106] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40107] = "cpe-stable-backport: Backported in 6.6.111"
+
+CVE_STATUS[CVE-2025-40108] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40109] = "cpe-stable-backport: Backported in 6.6.111"
+
+CVE_STATUS[CVE-2025-40110] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40111] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40112] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40113] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-40114] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-40115] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40116] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40117] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40118] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40119] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40120] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40121] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40122] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40123] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40124] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40125] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40126] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40127] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40129] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40130] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-40131] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40132] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-40133] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-40134] = "cpe-stable-backport: Backported in 6.6.112"
+
+# CVE-2025-40135 may need backporting (fixed from 6.6.130)
+
+# CVE-2025-40136 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40137] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40138] = "fixed-version: only affects 6.17 onwards"
+
+# CVE-2025-40139 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40140] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40141] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40142] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-40143] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40145] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2025-40146 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40147] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-40148] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40149] = "cpe-stable-backport: Backported in 6.6.121"
+
+# CVE-2025-40150 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2025-40151] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40152] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40153] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40154] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40155] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-40156] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40157] = "cpe-stable-backport: Backported in 6.6.112"
+
+# CVE-2025-40158 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40159] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-40160] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40161] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-40162] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-40163] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40164] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-40165] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40166] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-40167] = "cpe-stable-backport: Backported in 6.6.114"
+
+# CVE-2025-40168 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40169] = "cpe-stable-backport: Backported in 6.6.112"
+
+# CVE-2025-40170 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40171] = "cpe-stable-backport: Backported in 6.6.112"
+
+CVE_STATUS[CVE-2025-40172] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40173] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40174] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-40175] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40176] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40177] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-40178] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40179] = "cpe-stable-backport: Backported in 6.6.113"
+
+# CVE-2025-40180 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40181] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-40182] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40183] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40184] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40185] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-40186] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40187] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40188] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40189] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-40190] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40191] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40192] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40193] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40194] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40195] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-40196] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40197] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40198] = "cpe-stable-backport: Backported in 6.6.114"
+
+CVE_STATUS[CVE-2025-40199] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-40200] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40201] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40202] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40203] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-40204] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40205] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40206] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40207] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40208] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40209] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-40210] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40211] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40212] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-40213] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40214] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40215] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-40216] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-40217] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-40218] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40219] = "cpe-stable-backport: Backported in 6.6.113"
+
+CVE_STATUS[CVE-2025-40220] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40221] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-40222] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40223] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40224] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40225] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-40226] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40227] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40228] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40229] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40230] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-40231] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40232] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40233] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40234] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40235] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-40236] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40237] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40238] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-40239] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-40240] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40241] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2025-40242 may need backporting (fixed from 6.6.131)
+
+CVE_STATUS[CVE-2025-40243] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40244] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40245] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40246] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2025-40247 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40248] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40249] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-40250] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40251] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40252] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40253] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40254] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40255] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-40256] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40257] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40258] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40259] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40260] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40261] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40262] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40263] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40264] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40265] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40266] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-40267] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-40268] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40269] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40270] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40271] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40272] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40273] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40274] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-40275] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40276] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-40277] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40278] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40279] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40280] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40281] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40282] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40283] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40284] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40285] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40286] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40287] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-40288] = "cpe-stable-backport: Backported in 6.6.117"
+
+# CVE-2025-40289 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40290] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40291] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40292] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40293] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40294] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40295] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40296] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40297] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40298] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40299] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40300] = "cpe-stable-backport: Backported in 6.6.106"
+
+CVE_STATUS[CVE-2025-40301] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40302] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-40303] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40304] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40305] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-40306] = "cpe-stable-backport: Backported in 6.6.117"
+
+# CVE-2025-40307 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40308] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40309] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-40310] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40311] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40312] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40313] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40314] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40315] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40316] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40317] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40318] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40319] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40320] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40321] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40322] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40323] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40324] = "cpe-stable-backport: Backported in 6.6.117"
+
+# CVE-2025-40325 needs backporting (fixed from 6.15)
+
+CVE_STATUS[CVE-2025-40326] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-40327] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-40328] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40329] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40330] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-40331] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40332] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-40333] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40334] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40335] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-40336] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-40337] = "cpe-stable-backport: Backported in 6.6.117"
+
+# CVE-2025-40338 needs backporting (fixed from 6.18)
+
+# CVE-2025-40339 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40340] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-40341] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40342] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40343] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40344] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-40345] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-40346] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40347] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40348] = "fixed-version: only affects 6.12.54 onwards"
+
+CVE_STATUS[CVE-2025-40349] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40350] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40351] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-40352] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-40353] = "fixed-version: only affects 6.11 onwards"
+
+# CVE-2025-40354 needs backporting (fixed from 6.18)
+
+# CVE-2025-40355 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-40356] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-40357] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-40358] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40359] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-40360] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40362] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-40363] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-40364] = "cpe-stable-backport: Backported in 6.6.78"
+
+CVE_STATUS[CVE-2025-68167] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-68168] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68169] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-68170] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-68171] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68172] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68173] = "cpe-stable-backport: Backported in 6.6.117"
+
+# CVE-2025-68174 needs backporting (fixed from 6.18)
+
+# CVE-2025-68175 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-68176] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68177] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68178] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68179] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68180] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-68181] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-68182] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-68183] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68184] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68185] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68186] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-68187] = "fixed-version: only affects 6.17 onwards"
+
+# CVE-2025-68188 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-68189] = "fixed-version: only affects 6.17 onwards"
+
+# CVE-2025-68190 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-68191] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68192] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68193] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-68194] = "cpe-stable-backport: Backported in 6.6.117"
+
+# CVE-2025-68195 has no known resolution
+
+CVE_STATUS[CVE-2025-68196] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-68197] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-68198] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-68199] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-68200] = "cpe-stable-backport: Backported in 6.6.117"
+
+# CVE-2025-68201 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-68202] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-68204] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-68205] = "fixed-version: only affects 6.17 onwards"
+
+# CVE-2025-68206 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2025-68207] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-68208] = "cpe-stable-backport: Backported in 6.6.117"
+
+# CVE-2025-68209 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-68210] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-68211] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2025-68212] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-68213] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-68214] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-68215] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-68216] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-68217] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-68218] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-68219] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-68220] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-68221] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-68222] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-68223] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2025-68225] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-68226] = "fixed-version: only affects 6.17.8 onwards"
+
+CVE_STATUS[CVE-2025-68227] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-68228] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-68229] = "cpe-stable-backport: Backported in 6.6.118"
+
+# CVE-2025-68230 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-68231] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-68232] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-68233] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-68234] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-68235] = "cpe-stable-backport: Backported in 6.6.118"
+
+# CVE-2025-68236 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-68237] = "cpe-stable-backport: Backported in 6.6.118"
+
+CVE_STATUS[CVE-2025-68238] = "cpe-stable-backport: Backported in 6.6.118"
+
+# CVE-2025-68239 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2025-68240] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-68241] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68242] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-68243] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-68244] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68245] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68246] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68247] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-68248] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-68249] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-68250] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-68251] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-68252] = "cpe-stable-backport: Backported in 6.6.115"
+
+CVE_STATUS[CVE-2025-68253] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-68254] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68255] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68256] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68257] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68258] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68259] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68260] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-68261] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68262] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-68263] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68264] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68265] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68266] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68281] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-68282] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68283] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68284] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68285] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68286] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68287] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68288] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68289] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68290] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68291] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68292] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-68293] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-68294] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-68295] = "cpe-stable-backport: Backported in 6.6.119"
+
+# CVE-2025-68296 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-68297] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68298] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-68299] = "fixed-version: only affects 6.17.9 onwards"
+
+CVE_STATUS[CVE-2025-68300] = "fixed-version: only affects 6.12.59 onwards"
+
+CVE_STATUS[CVE-2025-68301] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68302] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68303] = "cpe-stable-backport: Backported in 6.6.119"
+
+# CVE-2025-68304 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-68305] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68306] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-68307] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68308] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68309] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-68310] = "cpe-stable-backport: Backported in 6.6.117"
+
+# CVE-2025-68311 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-68312] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68313] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-68314] = "fixed-version: only affects 6.17 onwards"
+
+# CVE-2025-68315 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-68316] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-68317] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-68318] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-68319] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-68320] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68321] = "cpe-stable-backport: Backported in 6.6.117"
+
+# CVE-2025-68322 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-68323] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2025-68324 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-68325] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68326] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-68327] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68328] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68329] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-68330] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68331] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68332] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68333] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2025-68334 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2025-68335] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68336] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68337] = "cpe-stable-backport: Backported in 6.6.120"
+
+# CVE-2025-68338 needs backporting (fixed from 6.18)
+
+CVE_STATUS[CVE-2025-68339] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68340] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2025-68341] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-68342] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68343] = "cpe-stable-backport: Backported in 6.6.119"
+
+CVE_STATUS[CVE-2025-68344] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68345] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68346] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68347] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68348] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-68349] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68350] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-68351] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-68352] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-68353] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2025-68354] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68355] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2025-68356 needs backporting (fixed from 6.19)
+
+# CVE-2025-68357 may need backporting (fixed from 6.6.130)
+
+# CVE-2025-68358 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2025-68359] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-68360] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-68361] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-68362] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68363] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68364] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68365] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-68366] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68367] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68368] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-68369] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68370] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-68371] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68372] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68373] = "fixed-version: only affects 6.17 onwards"
+
+# CVE-2025-68374 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-68375] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2025-68376 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-68377] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2025-68378 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-68379] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68380] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68724] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68725] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-68726] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-68727] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68728] = "cpe-stable-backport: Backported in 6.6.120"
+
+# CVE-2025-68729 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-68730] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-68731] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-68732] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68733] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68734] = "cpe-stable-backport: Backported in 6.6.117"
+
+CVE_STATUS[CVE-2025-68735] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2025-68736 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-68737] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-68738] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-68739] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-68740] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68741] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68742] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68743] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-68744] = "cpe-stable-backport: Backported in 6.6.120"
+
+# CVE-2025-68745 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-68746] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68747] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-68748] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-68749] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-68750] = "cpe-stable-backport: Backported in 6.6.96"
+
+CVE_STATUS[CVE-2025-68751] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-68752] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-68753] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68754] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-68755] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68756] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68757] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68758] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68759] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68760] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-68761] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-68762] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-68763] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68764] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68765] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68766] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68767] = "cpe-stable-backport: Backported in 6.6.120"
+
+# CVE-2025-68768 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-68769] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68770] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-68771] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68772] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68773] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68774] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68775] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68776] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68777] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68778] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68779] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-68780] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68781] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68782] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68783] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68784] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-68785] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68786] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68787] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68788] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68790] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-68791] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-68792] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-68793] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-68794] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68795] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68796] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68797] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68798] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68799] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68800] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68801] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68802] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-68803] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2025-68804] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68805] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-68806] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68807] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-68808] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68809] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68810] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-68811] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2025-68812] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-68813] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68814] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68815] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68816] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68817] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68818] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68819] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68820] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-68821] = "cpe-stable-backport: Backported in 6.6.120"
+
+# CVE-2025-68822 needs backporting (fixed from 6.19)
+
+# CVE-2025-68823 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2025-71064] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71065] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71066] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71067] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71068] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71069] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71070] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-71071] = "cpe-stable-backport: Backported in 6.6.120"
+
+# CVE-2025-71072 needs backporting (fixed from 6.19)
+
+# CVE-2025-71073 needs backporting (fixed from 6.19)
+
+# CVE-2025-71074 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-71075] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71076] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-71077] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71078] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71079] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71080] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-71081] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71082] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71083] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71084] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71085] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71086] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71087] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71088] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71089] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71090] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-71091] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71092] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-71093] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71094] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71095] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71096] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71097] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71098] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71099] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-71100] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-71101] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71102] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71103] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-71104] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71105] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71106] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-71107] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71108] = "cpe-stable-backport: Backported in 6.6.120"
+
+# CVE-2025-71109 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2025-71110] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-71111] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71112] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71113] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71114] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71115] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-71116] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71117] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-71118] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71119] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71120] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71121] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71122] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71123] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71124] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-71125] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71126] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71127] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71128] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-71129] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71130] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71131] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71132] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71133] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71134] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2025-71135] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2025-71136] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71137] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71138] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71139] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-71140] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71141] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71142] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-71143] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71144] = "cpe-stable-backport: Backported in 6.6.120"
+
+# CVE-2025-71145 has no known resolution
+
+CVE_STATUS[CVE-2025-71146] = "fixed-version: only affects 6.12.63 onwards"
+
+CVE_STATUS[CVE-2025-71147] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71148] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71149] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71150] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71151] = "cpe-stable-backport: Backported in 6.6.120"
+
+# CVE-2025-71152 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2025-71153] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71154] = "cpe-stable-backport: Backported in 6.6.120"
+
+CVE_STATUS[CVE-2025-71155] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-71156] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2025-71157] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2025-71158] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-71159] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-71160] = "cpe-stable-backport: Backported in 6.6.121"
+
+# CVE-2025-71161 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2025-71162] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71163] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71180] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2025-71181] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-71182] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2025-71183] = "cpe-stable-backport: Backported in 6.6.121"
+
+# CVE-2025-71184 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2025-71185] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71186] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71187] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-71188] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71189] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71190] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71191] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71192] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2025-71193] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71194] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71195] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71196] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71197] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71198] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71199] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71200] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2025-71201] = "fixed-version: only affects 6.14 onwards"
+
+# CVE-2025-71202 needs backporting (fixed from 6.19)
+
+# CVE-2025-71203 may need backporting (fixed from 6.6.130)
+
+# CVE-2025-71204 may need backporting (fixed from 6.6.124)
+
+# CVE-2025-71220 may need backporting (fixed from 6.6.124)
+
+# CVE-2025-71221 may need backporting (fixed from 6.6.130)
+
+# CVE-2025-71222 may need backporting (fixed from 6.6.124)
+
+# CVE-2025-71223 may need backporting (fixed from 6.6.124)
+
+# CVE-2025-71224 may need backporting (fixed from 6.6.124)
+
+# CVE-2025-71225 needs backporting (fixed from 6.19)
+
+# CVE-2025-71227 needs backporting (fixed from 6.19)
+
+# CVE-2025-71229 may need backporting (fixed from 6.6.125)
+
+CVE_STATUS[CVE-2025-71230] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-71231] = "fixed-version: only affects 6.8 onwards"
+
+# CVE-2025-71232 may need backporting (fixed from 6.6.125)
+
+# CVE-2025-71233 may need backporting (fixed from 6.6.127)
+
+CVE_STATUS[CVE-2025-71234] = "fixed-version: only affects 6.9 onwards"
+
+# CVE-2025-71235 may need backporting (fixed from 6.6.125)
+
+# CVE-2025-71236 may need backporting (fixed from 6.6.125)
+
+# CVE-2025-71237 may need backporting (fixed from 6.6.125)
+
+# CVE-2025-71238 may need backporting (fixed from 6.6.127)
+
+# CVE-2025-71239 may need backporting (fixed from 6.6.128)
+
+# CVE-2025-71265 may need backporting (fixed from 6.6.128)
+
+# CVE-2025-71266 may need backporting (fixed from 6.6.128)
+
+# CVE-2025-71267 may need backporting (fixed from 6.6.128)
+
+# CVE-2025-71268 may need backporting (fixed from 6.6.124)
+
+# CVE-2025-71269 needs backporting (fixed from 6.19)
+
+# CVE-2025-71270 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-22978] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-22979] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-22980] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-22981] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2026-22982] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-22983] = "fixed-version: only affects 6.18.4 onwards"
+
+CVE_STATUS[CVE-2026-22984] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-22985] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2026-22986] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2026-22987] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-22988] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-22989] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2026-22990] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-22991] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-22992] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-22993] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2026-22994] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-22995] = "fixed-version: only affects 6.18.4 onwards"
+
+# CVE-2026-22996 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-22997] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-22998] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-22999] = "cpe-stable-backport: Backported in 6.6.122"
+
+# CVE-2026-23000 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-23001] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23002] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2026-23003] = "cpe-stable-backport: Backported in 6.6.122"
+
+# CVE-2026-23004 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23005] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23006] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23007] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2026-23008] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23009] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23010] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23011] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23012] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23013] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2026-23014] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23015] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23016] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23017] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2026-23018] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23019] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-23020] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-23021] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-23022] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23023] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2026-23024] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23025] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23026] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23027] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23028] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23029] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23030] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23031] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23032] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23033] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23034] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2026-23035 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-23036] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23037] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23038] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23039] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23040] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23041] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23042] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23043] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23044] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-23045] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23046] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-23047] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-23048] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23049] = "cpe-stable-backport: Backported in 6.6.122"
+
+# CVE-2026-23050 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23051] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23052] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2026-23053 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23054] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23055] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2026-23056] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23057] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2026-23058] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23059] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23060] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23061] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23062] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23063] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23064] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23065] = "fixed-version: only affects 6.8 onwards"
+
+# CVE-2026-23066 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23067] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23068] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23069] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23070] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2026-23071] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23072] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2026-23073] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23074] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23075] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23076] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23077] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23078] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23079] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23080] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23081] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23082] = "fixed-version: only affects 6.12.67 onwards"
+
+CVE_STATUS[CVE-2026-23083] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23084] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23085] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23086] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23087] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23088] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23089] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23090] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23091] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23092] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23093] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2026-23094] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23095] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23096] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23097] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23098] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23099] = "cpe-stable-backport: Backported in 6.6.122"
+
+# CVE-2026-23100 may need backporting (fixed from 6.6.127)
+
+CVE_STATUS[CVE-2026-23101] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23102] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2026-23103] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23104] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2026-23105] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23106] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23107] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23108] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23109] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23110] = "cpe-stable-backport: Backported in 6.6.122"
+
+# CVE-2026-23111 may need backporting (fixed from 6.6.124)
+
+# CVE-2026-23112 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23113] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23114] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23115] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-23116] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23117] = "fixed-version: only affects 6.18.2 onwards"
+
+# CVE-2026-23118 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23119] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23120] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23121] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23122] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23123] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23124] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23125] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23126] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23127] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23128] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23129] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2026-23130] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23131] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23132] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23133] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23134] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23135] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23136] = "cpe-stable-backport: Backported in 6.6.121"
+
+# CVE-2026-23137 needs backporting (fixed from 6.19)
+
+# CVE-2026-23138 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23139] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-23140] = "cpe-stable-backport: Backported in 6.6.121"
+
+CVE_STATUS[CVE-2026-23141] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23142] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23143] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-23144] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23145] = "cpe-stable-backport: Backported in 6.6.122"
+
+CVE_STATUS[CVE-2026-23146] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2026-23147] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2026-23148] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2026-23149] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23150] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2026-23151] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2026-23152] = "fixed-version: only affects 6.7 onwards"
+
+CVE_STATUS[CVE-2026-23153] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2026-23154 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23155] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2026-23156] = "cpe-stable-backport: Backported in 6.6.123"
+
+# CVE-2026-23157 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23158] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2026-23159] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2026-23160] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2026-23161] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2026-23162] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23163] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2026-23164] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2026-23165] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23166] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2026-23167] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2026-23168] = "cpe-stable-backport: Backported in 6.6.123"
+
+# CVE-2026-23169 may need backporting (fixed from 6.6.125)
+
+CVE_STATUS[CVE-2026-23170] = "cpe-stable-backport: Backported in 6.6.123"
+
+# CVE-2026-23171 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-23172] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2026-23173] = "cpe-stable-backport: Backported in 6.6.123"
+
+CVE_STATUS[CVE-2026-23174] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23175] = "fixed-version: only affects 6.17 onwards"
+
+# CVE-2026-23176 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23177] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2026-23178 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23179] = "fixed-version: only affects 6.7 onwards"
+
+# CVE-2026-23180 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23181] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2026-23182 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23183] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23184] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23185] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23186] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2026-23187 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23188] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2026-23189] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2026-23190 may need backporting (fixed from 6.6.124)
+
+# CVE-2026-23191 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-23192] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2026-23193 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23194] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23195] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23196] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23197] = "fixed-version: only affects 6.13 onwards"
+
+# CVE-2026-23198 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23199] = "fixed-version: only affects 6.11 onwards"
+
+# CVE-2026-23200 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23201] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2026-23202 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23203] = "fixed-version: only affects 6.17 onwards"
+
+# CVE-2026-23204 may need backporting (fixed from 6.6.124)
+
+# CVE-2026-23205 may need backporting (fixed from 6.6.124)
+
+# CVE-2026-23206 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23207] = "fixed-version: only affects 6.12.63 onwards"
+
+# CVE-2026-23208 needs backporting (fixed from 6.19)
+
+# CVE-2026-23209 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23210] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2026-23211] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23212] = "cpe-stable-backport: Backported in 6.6.123"
+
+# CVE-2026-23213 needs backporting (fixed from 6.19)
+
+# CVE-2026-23214 needs backporting (fixed from 6.19)
+
+CVE_STATUS[CVE-2026-23215] = "fixed-version: only affects 6.11 onwards"
+
+# CVE-2026-23216 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23217] = "fixed-version: only affects 6.11 onwards"
+
+CVE_STATUS[CVE-2026-23218] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23219] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2026-23220 may need backporting (fixed from 6.6.125)
+
+# CVE-2026-23221 may need backporting (fixed from 6.6.127)
+
+# CVE-2026-23222 may need backporting (fixed from 6.6.125)
+
+CVE_STATUS[CVE-2026-23223] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2026-23224] = "fixed-version: only affects 6.12 onwards"
+
+CVE_STATUS[CVE-2026-23225] = "fixed-version: only affects 6.19 onwards"
+
+# CVE-2026-23226 needs backporting (fixed from 7.0rc1)
+
+# CVE-2026-23227 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23228 may need backporting (fixed from 6.6.125)
+
+# CVE-2026-23229 may need backporting (fixed from 6.6.125)
+
+# CVE-2026-23230 may need backporting (fixed from 6.6.125)
+
+# CVE-2026-23231 may need backporting (fixed from 6.6.128)
+
+CVE_STATUS[CVE-2026-23232] = "fixed-version: only affects 6.19 onwards"
+
+# CVE-2026-23233 may need backporting (fixed from 6.6.127)
+
+# CVE-2026-23234 may need backporting (fixed from 6.6.127)
+
+# CVE-2026-23235 may need backporting (fixed from 6.6.127)
+
+# CVE-2026-23236 may need backporting (fixed from 6.6.127)
+
+# CVE-2026-23237 may need backporting (fixed from 6.6.127)
+
+# CVE-2026-23238 may need backporting (fixed from 6.6.127)
+
+# CVE-2026-23239 needs backporting (fixed from 7.0rc2)
+
+# CVE-2026-23240 needs backporting (fixed from 7.0rc2)
+
+CVE_STATUS[CVE-2026-23241] = "fixed-version: only affects 6.13 onwards"
+
+# CVE-2026-23242 may need backporting (fixed from 6.6.128)
+
+# CVE-2026-23243 may need backporting (fixed from 6.6.128)
+
+# CVE-2026-23244 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23245 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23246 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23247 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23248] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23249] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2026-23250] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2026-23251] = "fixed-version: only affects 6.10 onwards"
+
+CVE_STATUS[CVE-2026-23252] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2026-23253 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23254 may need backporting (fixed from 6.6.124)
+
+# CVE-2026-23255 needs backporting (fixed from 6.19)
+
+# CVE-2026-23256 may need backporting (fixed from 6.6.124)
+
+# CVE-2026-23257 may need backporting (fixed from 6.6.124)
+
+# CVE-2026-23258 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23259] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2026-23260 may need backporting (fixed from 6.6.124)
+
+# CVE-2026-23261 may need backporting (fixed from 6.6.124)
+
+# CVE-2026-23262 may need backporting (fixed from 6.6.124)
+
+CVE_STATUS[CVE-2026-23263] = "fixed-version: only affects 6.17 onwards"
+
+# CVE-2026-23264 may need backporting (fixed from 6.6.124)
+
+# CVE-2026-23265 needs backporting (fixed from 7.0rc1)
+
+# CVE-2026-23266 may need backporting (fixed from 6.6.127)
+
+# CVE-2026-23267 may need backporting (fixed from 6.6.127)
+
+# CVE-2026-23268 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23269 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23270 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23271 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23272 needs backporting (fixed from 7.0rc3)
+
+# CVE-2026-23273 may need backporting (fixed from 6.6.128)
+
+# CVE-2026-23274 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23275] = "fixed-version: only affects 6.13 onwards"
+
+# CVE-2026-23276 needs backporting (fixed from 7.0rc4)
+
+# CVE-2026-23277 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23278 needs backporting (fixed from 7.0rc4)
+
+# CVE-2026-23279 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23280] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2026-23281 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23282] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23283] = "fixed-version: only affects 6.19 onwards"
+
+# CVE-2026-23284 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23285 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23286 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23287 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23288] = "fixed-version: only affects 6.19 onwards"
+
+# CVE-2026-23289 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23290 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23291 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23292 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23293 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23294] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23295] = "fixed-version: only affects 6.19 onwards"
+
+# CVE-2026-23296 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23297] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2026-23298 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23299] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2026-23300 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23301] = "fixed-version: only affects 6.19 onwards"
+
+# CVE-2026-23302 needs backporting (fixed from 7.0rc3)
+
+# CVE-2026-23303 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23304 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23305] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2026-23306 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23307 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23308 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23309 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23310 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23311] = "fixed-version: only affects 6.15 onwards"
+
+# CVE-2026-23312 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23313 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23314] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2026-23315 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23316] = "fixed-version: only affects 6.11 onwards"
+
+# CVE-2026-23317 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23318 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23319 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23320 needs backporting (fixed from 7.0rc1)
+
+# CVE-2026-23321 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23322] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23323] = "fixed-version: only affects 6.19 onwards"
+
+# CVE-2026-23324 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23325 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23326] = "fixed-version: only affects 6.13 onwards"
+
+# CVE-2026-23327 needs backporting (fixed from 7.0rc2)
+
+CVE_STATUS[CVE-2026-23328] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2026-23329] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2026-23330 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2026-23332] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2026-23333 has no known resolution
+
+# CVE-2026-23334 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23335 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23336 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23337] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23338] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2026-23339 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23340 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23341] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23342] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2026-23343 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23344] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23345] = "fixed-version: only affects 6.13 onwards"
+
+# CVE-2026-23346 needs backporting (fixed from 7.0rc2)
+
+# CVE-2026-23347 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23348 needs backporting (fixed from 7.0rc2)
+
+CVE_STATUS[CVE-2026-23349] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23350] = "fixed-version: only affects 6.19 onwards"
+
+# CVE-2026-23351 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23352 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23353] = "fixed-version: only affects 6.19 onwards"
+
+CVE_STATUS[CVE-2026-23354] = "fixed-version: only affects 6.9 onwards"
+
+CVE_STATUS[CVE-2026-23355] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2026-23356 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23357 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23358] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2026-23359 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23360 may need backporting (fixed from 6.6.131)
+
+# CVE-2026-23361 needs backporting (fixed from 7.0rc2)
+
+# CVE-2026-23362 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23363] = "fixed-version: only affects 6.7 onwards"
+
+# CVE-2026-23364 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23365 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23366] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2026-23367 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23368 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23369] = "fixed-version: only affects 6.7 onwards"
+
+# CVE-2026-23370 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23371 needs backporting (fixed from 7.0rc3)
+
+# CVE-2026-23372 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23373] = "fixed-version: only affects 6.9 onwards"
+
+# CVE-2026-23374 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23375] = "fixed-version: only affects 6.8 onwards"
+
+CVE_STATUS[CVE-2026-23376] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2026-23377 needs backporting (fixed from 7.0rc3)
+
+# CVE-2026-23378 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23379 may need backporting (fixed from 6.6.130)
+
+CVE_STATUS[CVE-2026-23380] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2026-23381 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23382 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23383 needs backporting (fixed from 7.0rc2)
+
+CVE_STATUS[CVE-2026-23384] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2026-23385] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2026-23386 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23387 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23388 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23389 needs backporting (fixed from 7.0rc3)
+
+CVE_STATUS[CVE-2026-23390] = "fixed-version: only affects 6.12 onwards"
+
+# CVE-2026-23391 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23392 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23393 needs backporting (fixed from 7.0rc5)
+
+CVE_STATUS[CVE-2026-23394] = "fixed-version: only affects 6.10 onwards"
+
+# CVE-2026-23395 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23396 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23397 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23398 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23399 needs backporting (fixed from 7.0rc5)
+
+CVE_STATUS[CVE-2026-23400] = "fixed-version: only affects 6.18 onwards"
+
+# CVE-2026-23401 may need backporting (fixed from 6.6.131)
+
+CVE_STATUS[CVE-2026-23402] = "fixed-version: only affects 6.16 onwards"
+
+# CVE-2026-23403 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23404 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23405 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23406 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23407 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23408 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23409 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23410 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23411 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23412 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23413 may need backporting (fixed from 6.6.130)
+
+# CVE-2026-23414 may need backporting (fixed from 6.6.131)
+
+CVE_STATUS[CVE-2026-23415] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2026-23416] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2026-23417] = "fixed-version: only affects 6.9 onwards"
+
+# CVE-2026-31788 may need backporting (fixed from 6.6.130)
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 42/66] build-appliance-image: switch SRC_URI to https protocol
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (40 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 41/66] linux-yocto/6.6: update CVE exclusions (6.6.123) Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 43/66] scripts: Default to https git protocol for YP/OE repos Yoann Congal
` (23 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Yoann Congal <yoann.congal@smile.fr>
Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"),
> The recommendation from server maintainers is that the https protocol
> is both faster and more reliable than the dedicated git protocol at this point.
> Switch to it where possible.
(cherry picked from commit 9bab238d26a3317a6212dc711427f4917eaac50e)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-core/images/build-appliance-image_15.0.0.bb | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/recipes-core/images/build-appliance-image_15.0.0.bb b/meta/recipes-core/images/build-appliance-image_15.0.0.bb
index 85521b6026a..3f6fcbcb3e3 100644
--- a/meta/recipes-core/images/build-appliance-image_15.0.0.bb
+++ b/meta/recipes-core/images/build-appliance-image_15.0.0.bb
@@ -27,7 +27,7 @@ inherit core-image setuptools3 features_check
REQUIRED_DISTRO_FEATURES += "xattr"
SRCREV ?= "f4877d8e682ed22e339fe6c07f3ffa28e50c7b98"
-SRC_URI = "git://git.yoctoproject.org/poky;branch=scarthgap \
+SRC_URI = "git://git.yoctoproject.org/poky;branch=scarthgap;protocol=https \
file://Yocto_Build_Appliance.vmx \
file://Yocto_Build_Appliance.vmxf \
file://README_VirtualBox_Guest_Additions.txt \
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 43/66] scripts: Default to https git protocol for YP/OE repos
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (41 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 42/66] build-appliance-image: switch SRC_URI to https protocol Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 44/66] oeqa/selftest/git-submodule-test: " Yoann Congal
` (22 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Yoann Congal <yoann.congal@smile.fr>
Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"),
> The recommendation from server maintainers is that the https protocol
> is both faster and more reliable than the dedicated git protocol at this point.
> Switch to it where possible.
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 74dd04549624b1d3ba6d4febe51fa9ba1c86944c)
---
scripts/combo-layer.conf.example | 4 ++--
scripts/contrib/patchtest.sh | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/scripts/combo-layer.conf.example b/scripts/combo-layer.conf.example
index 90e2b58723b..4ae3db45ab1 100644
--- a/scripts/combo-layer.conf.example
+++ b/scripts/combo-layer.conf.example
@@ -14,7 +14,7 @@ signoff = False
# mandatory options
# git upstream uri
-src_uri = git://git.openembedded.org/bitbake
+src_uri = https://git.openembedded.org/bitbake
# the directory to clone the component repo
local_repo_dir = /home/kyu3/src/test/bitbake
@@ -76,7 +76,7 @@ last_revision =
# that matches the original commit.
[oe-core]
-src_uri = git://git.openembedded.org/openembedded-core
+src_uri = https://git.openembedded.org/openembedded-core
local_repo_dir = /home/kyu3/src/test/oecore
dest_dir = .
last_revision =
diff --git a/scripts/contrib/patchtest.sh b/scripts/contrib/patchtest.sh
index b1e1ea334b9..550b6a88f3c 100755
--- a/scripts/contrib/patchtest.sh
+++ b/scripts/contrib/patchtest.sh
@@ -75,8 +75,8 @@ source $PTENV/bin/activate
cd $PTENV
# clone or pull
-clone git://git.yoctoproject.org/patchtest $PT
-clone git://git.yoctoproject.org/patchtest-oe $PTOE
+clone https://git.yoctoproject.org/patchtest $PT
+clone https://git.yoctoproject.org/patchtest-oe $PTOE
# install requirements
pip install -r $PT/requirements.txt --quiet
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 44/66] oeqa/selftest/git-submodule-test: Default to https git protocol for YP/OE repos
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (42 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 43/66] scripts: Default to https git protocol for YP/OE repos Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 45/66] meta/files/layers.example.json: switch to https clone URIs Yoann Congal
` (21 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Yoann Congal <yoann.congal@smile.fr>
Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"),
> The recommendation from server maintainers is that the https protocol
> is both faster and more reliable than the dedicated git protocol at this point.
> Switch to it where possible.
Use ";protocol=https" for the parent git submodule and, also, update the
SRCREV to point to a commit where submodules are reference through a
https:// URL instead of a git:// one.
Update the expected output of the archiver test.
(cherry picked from commit 5c78db972f1b97ce67c8c461a2d389b9248793db)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../recipes-test/git-submodule-test/git-submodule-test.bb | 4 ++--
meta/lib/oeqa/selftest/cases/archiver.py | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb b/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb
index 90d9b66b2c8..16d042cb04e 100644
--- a/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb
+++ b/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb
@@ -7,8 +7,8 @@ INHIBIT_DEFAULT_DEPS = "1"
UPSTREAM_VERSION_UNKNOWN = "1"
-SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master"
-SRCREV = "a2885dd7d25380d23627e7544b7bbb55014b16ee"
+SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master;protocol=https"
+SRCREV = "f280847494763cdcf71197557a81ba7d8a6bce42"
S = "${WORKDIR}/git"
diff --git a/meta/lib/oeqa/selftest/cases/archiver.py b/meta/lib/oeqa/selftest/cases/archiver.py
index 3cb888c5067..4fc1bf4b303 100644
--- a/meta/lib/oeqa/selftest/cases/archiver.py
+++ b/meta/lib/oeqa/selftest/cases/archiver.py
@@ -335,8 +335,8 @@ class Archiver(OESelftestTestCase):
bb_vars = get_bb_vars(['DEPLOY_DIR_SRC'])
for target_file_name in [
- 'gitsmshallow_git.yoctoproject.org.git-submodule-test_a2885dd-1_master.tar.gz',
- 'gitsmshallow_git.yoctoproject.org.bitbake-gitsm-test1_bare_120f4c7-1.tar.gz',
+ 'gitsmshallow_git.yoctoproject.org.git-submodule-test_f280847-1_master.tar.gz',
+ 'gitsmshallow_git.yoctoproject.org.bitbake-gitsm-test1_bare_79a0efa-1.tar.gz',
'gitsmshallow_git.yoctoproject.org.bitbake-gitsm-test2_bare_f66699e-1.tar.gz',
'gitsmshallow_git.openembedded.org.bitbake_bare_52a144a-1.tar.gz',
'gitsmshallow_git.openembedded.org.bitbake_bare_c39b997-1.tar.gz'
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 45/66] meta/files/layers.example.json: switch to https clone URIs
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (43 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 44/66] oeqa/selftest/git-submodule-test: " Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 46/66] oeqa/sdk: Default to https git protocol for YP/OE repos Yoann Congal
` (20 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Yoann Congal <yoann.congal@smile.fr>
Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"),
> The recommendation from server maintainers is that the https protocol
> is both faster and more reliable than the dedicated git protocol at this point.
> Switch to it where possible.
(cherry picked from commit d1fb36b3ddcb033ef472042cffb0dfa68714ba96)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/files/layers.example.json | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/meta/files/layers.example.json b/meta/files/layers.example.json
index 0a6a6a7b489..91b32736c15 100644
--- a/meta/files/layers.example.json
+++ b/meta/files/layers.example.json
@@ -20,7 +20,7 @@
"describe": "15.0-hardknott-3.3-310-g0a96edae",
"remotes": {
"origin": {
- "uri": "git://git.yoctoproject.org/meta-intel"
+ "uri": "https://git.yoctoproject.org/meta-intel"
}
},
"rev": "0a96edae609a3f48befac36af82cf1eed6786b4a"
@@ -33,7 +33,7 @@
"describe": "4.1_M1-374-g9dda719b2a",
"remotes": {
"origin": {
- "uri": "git://git.yoctoproject.org/poky"
+ "uri": "https://git.yoctoproject.org/poky"
},
"poky-contrib": {
"uri": "ssh://git@push.yoctoproject.org/poky-contrib"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 46/66] oeqa/sdk: Default to https git protocol for YP/OE repos
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (44 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 45/66] meta/files/layers.example.json: switch to https clone URIs Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 47/66] selftest/scripts: Update old git protocol references Yoann Congal
` (19 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Yoann Congal <yoann.congal@smile.fr>
Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"),
> The recommendation from server maintainers is that the https protocol
> is both faster and more reliable than the dedicated git protocol at this point.
> Switch to it where possible.
(cherry picked from commit 037f83803905fdbdf77ed325466abaa8a501d7ff)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/lib/oeqa/sdk/buildtools-docs-cases/build.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/lib/oeqa/sdk/buildtools-docs-cases/build.py b/meta/lib/oeqa/sdk/buildtools-docs-cases/build.py
index 6e3ee94292b..9f963f18f8d 100644
--- a/meta/lib/oeqa/sdk/buildtools-docs-cases/build.py
+++ b/meta/lib/oeqa/sdk/buildtools-docs-cases/build.py
@@ -15,5 +15,5 @@ class BuildTests(OESDKTestCase):
"""
def test_docs_build(self):
with tempfile.TemporaryDirectory(prefix='docs-tarball-build-', dir=self.tc.sdk_dir) as testdir:
- self._run('git clone git://git.yoctoproject.org/yocto-docs %s' % testdir)
+ self._run('git clone https://git.yoctoproject.org/yocto-docs %s' % testdir)
self._run('cd %s/documentation && make html' % testdir)
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 47/66] selftest/scripts: Update old git protocol references
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (45 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 46/66] oeqa/sdk: Default to https git protocol for YP/OE repos Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 48/66] dtc: backport fix for build with glibc-2.43 Yoann Congal
` (18 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Richard Purdie <richard.purdie@linuxfoundation.org>
git protocol accesses to our infrastructure are currently struggling and this
has highlighted a number of places we're making those obsolete access forms.
Update them to use https instead of the git protocol since it is preferred
and more reliable.
The devtool test needed quoting to handle the ';' in the url. The -f option
to devtool also shows a deprecation warning so remove that.
There were internal references to git protocol urls inside the nested git
submodules test report, which means those repos need updating to use
new git revisions.
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 1ceba42623c5187d2f5a100d6a523abcdc75d34e)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../recipes-test/devtool/devtool-upgrade-test2_git.bb | 2 +-
.../devtool/devtool-upgrade-test2_git.bb.upgraded | 2 +-
meta/lib/oeqa/selftest/cases/devtool.py | 4 ++--
meta/lib/oeqa/selftest/cases/externalsrc.py | 2 +-
meta/lib/oeqa/selftest/cases/gitarchivetests.py | 2 +-
meta/lib/oeqa/selftest/cases/sstatetests.py | 2 +-
meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py | 2 +-
scripts/yocto_testresults_query.py | 2 +-
8 files changed, 9 insertions(+), 9 deletions(-)
diff --git a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb
index 2558a22ce57..deb3dfb82e3 100644
--- a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb
+++ b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb
@@ -11,7 +11,7 @@ SRCREV = "1a3e1343761b30750bed70e0fd688f6d3c7b3717"
PV = "0.1+git"
PR = "r2"
-SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master"
+SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master;protocol=https"
UPSTREAM_CHECK_COMMITS = "1"
RECIPE_NO_UPDATE_REASON = "This recipe is used to test devtool upgrade feature"
diff --git a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded
index eaa8bd898da..5e3d510f29b 100644
--- a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded
+++ b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded
@@ -10,7 +10,7 @@ DEPENDS = "dbus"
SRCREV = "6cc6077a36fe2648a5f993fe7c16c9632f946517"
PV = "0.1+git"
-SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master"
+SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master;protocol=https"
UPSTREAM_CHECK_COMMITS = "1"
RECIPE_NO_UPDATE_REASON = "This recipe is used to test devtool upgrade feature"
diff --git a/meta/lib/oeqa/selftest/cases/devtool.py b/meta/lib/oeqa/selftest/cases/devtool.py
index 55048830bfe..d56696c10dd 100644
--- a/meta/lib/oeqa/selftest/cases/devtool.py
+++ b/meta/lib/oeqa/selftest/cases/devtool.py
@@ -585,7 +585,7 @@ class DevtoolAddTests(DevtoolBase):
def test_devtool_add_fetch_git(self):
tempdir = tempfile.mkdtemp(prefix='devtoolqa')
self.track_for_cleanup(tempdir)
- url = 'gitsm://git.yoctoproject.org/mraa'
+ url = 'gitsm://git.yoctoproject.org/mraa;protocol=https'
url_branch = '%s;branch=master' % url
checkrev = 'ae127b19a50aa54255e4330ccfdd9a5d058e581d'
testrecipe = 'mraa'
@@ -594,7 +594,7 @@ class DevtoolAddTests(DevtoolBase):
self.track_for_cleanup(self.workspacedir)
self.add_command_to_tearDown('bitbake -c cleansstate %s' % testrecipe)
self.add_command_to_tearDown('bitbake-layers remove-layer */workspace')
- result = runCmd('devtool add %s %s -a -f %s' % (testrecipe, srcdir, url))
+ result = runCmd('devtool add %s %s -a "%s"' % (testrecipe, srcdir, url))
self.assertExists(os.path.join(self.workspacedir, 'conf', 'layer.conf'), 'Workspace directory not created: %s' % result.output)
self.assertTrue(os.path.isfile(os.path.join(srcdir, 'imraa', 'imraa.c')), 'Unable to find imraa/imraa.c in source directory')
# Test devtool status
diff --git a/meta/lib/oeqa/selftest/cases/externalsrc.py b/meta/lib/oeqa/selftest/cases/externalsrc.py
index 1d800dc82ca..c127d254e36 100644
--- a/meta/lib/oeqa/selftest/cases/externalsrc.py
+++ b/meta/lib/oeqa/selftest/cases/externalsrc.py
@@ -17,7 +17,7 @@ class ExternalSrc(OESelftestTestCase):
# so we check only that a recipe with externalsrc can be parsed
def test_externalsrc_srctree_hash_files(self):
test_recipe = "git-submodule-test"
- git_url = "git://git.yoctoproject.org/git-submodule-test"
+ git_url = "https://git.yoctoproject.org/git-submodule-test"
externalsrc_dir = tempfile.TemporaryDirectory(prefix="externalsrc").name
self.write_config(
diff --git a/meta/lib/oeqa/selftest/cases/gitarchivetests.py b/meta/lib/oeqa/selftest/cases/gitarchivetests.py
index 71382089c12..c40adf25818 100644
--- a/meta/lib/oeqa/selftest/cases/gitarchivetests.py
+++ b/meta/lib/oeqa/selftest/cases/gitarchivetests.py
@@ -105,7 +105,7 @@ class GitArchiveTests(OESelftestTestCase):
delete_fake_repository(path)
def test_get_tags_without_valid_remote(self):
- url = 'git://git.yoctoproject.org/poky'
+ url = 'https://git.yoctoproject.org/poky'
path, git_obj = create_fake_repository(False, None, False)
tags = ga.get_tags(git_obj, self.log, pattern="yocto-*", url=url)
diff --git a/meta/lib/oeqa/selftest/cases/sstatetests.py b/meta/lib/oeqa/selftest/cases/sstatetests.py
index 4a2c425ac8d..42a481500a4 100644
--- a/meta/lib/oeqa/selftest/cases/sstatetests.py
+++ b/meta/lib/oeqa/selftest/cases/sstatetests.py
@@ -228,7 +228,7 @@ class SStateTests(SStateBase):
# Use dbus-wait as a local git repo we can add a commit between two builds in
pn = 'dbus-wait'
srcrev = '6cc6077a36fe2648a5f993fe7c16c9632f946517'
- url = 'git://git.yoctoproject.org/dbus-wait'
+ url = 'https://git.yoctoproject.org/dbus-wait'
result = runCmd('git clone %s noname' % url, cwd=tempdir)
srcdir = os.path.join(tempdir, 'noname')
result = runCmd('git reset --hard %s' % srcrev, cwd=srcdir)
diff --git a/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py b/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py
index 312edb64319..05a7f99809e 100644
--- a/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py
+++ b/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py
@@ -36,4 +36,4 @@ class TestResultsQueryTests(OESelftestTestCase):
shutil.rmtree(workdir, ignore_errors=True)
self.fail(f"Can not execute git commands in {workdir}")
shutil.rmtree(workdir)
- self.assertEqual(url, "git://git.yoctoproject.org/yocto-testresults")
+ self.assertEqual(url, "https://git.yoctoproject.org/yocto-testresults")
diff --git a/scripts/yocto_testresults_query.py b/scripts/yocto_testresults_query.py
index 521ead8473a..08bd8cbff17 100755
--- a/scripts/yocto_testresults_query.py
+++ b/scripts/yocto_testresults_query.py
@@ -21,7 +21,7 @@ script_path = os.path.dirname(os.path.realpath(__file__))
poky_path = os.path.abspath(os.path.join(script_path, ".."))
resulttool = os.path.abspath(os.path.join(script_path, "resulttool"))
logger = scriptutils.logger_create(sys.argv[0])
-testresults_default_url="git://git.yoctoproject.org/yocto-testresults"
+testresults_default_url="https://git.yoctoproject.org/yocto-testresults"
def create_workdir():
workdir = tempfile.mkdtemp(prefix='yocto-testresults-query.')
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 48/66] dtc: backport fix for build with glibc-2.43
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (46 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 47/66] selftest/scripts: Update old git protocol references Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 49/66] pseudo: Add fix for glibc 2.43 Yoann Congal
` (17 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Martin Jansa <martin.jansa@gmail.com>
glibc-2.43 isn't used in OE builds yet, but this fixes dtc-native:
https://errors.yoctoproject.org/Errors/Details/903983/
../sources/dtc-1.7.2/libfdt/fdt_overlay.c: In function ‘overlay_fixup_phandle’:
../sources/dtc-1.7.2/libfdt/fdt_overlay.c:424:21: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers]
424 | sep = memchr(fixup_str, ':', fixup_len);
| ^
../sources/dtc-1.7.2/libfdt/fdt_overlay.c:434:21: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers]
434 | sep = memchr(name, ':', fixup_len);
| ^
cc1: all warnings being treated as errors
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 28552a7b6c94060c7ab3899619ab8afb74124d02)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../0001-Fix-discarded-const-qualifiers.patch | 85 +++++++++++++++++++
meta/recipes-kernel/dtc/dtc_1.7.0.bb | 1 +
2 files changed, 86 insertions(+)
create mode 100644 meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch
diff --git a/meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch b/meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch
new file mode 100644
index 00000000000..c643410ae9b
--- /dev/null
+++ b/meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch
@@ -0,0 +1,85 @@
+From 861cb43eb53afff83e28ba0e0f88ffa464ebe8ca Mon Sep 17 00:00:00 2001
+From: Stephen Gallagher <sgallagh@redhat.com>
+Date: Tue, 6 Jan 2026 14:19:30 -0500
+Subject: [PATCH] Fix discarded const qualifiers
+
+It's unsafe to implicitly discard the const qualifier on a pointer. In
+overlay_fixup_phandle(), this was probably just an oversight, and making
+the "sep" variable a const char * is sufficient to fix it.
+
+In create_node(), however, the "p" variable is directly modifying the
+buffer pointed to by "const char* node_name". To fix this, we need to
+actually make a duplicate of the buffer and operate on that instead.
+
+This introduces a malloc()/free() and an unbounded strdup() into the
+operation, but fdtput isn't a long-running service and the node_name
+argument comes directly from argv, so this shouldn't introduce a
+significant performance impact.
+
+Signed-off-by: Stephen Gallagher <sgallagh@redhat.com>
+Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
+Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
+Upstream-Status: Backport [https://git.kernel.org/pub/scm/utils/dtc/dtc.git/commit/libfdt/fdt_overlay.c?h=main&id=9a1c801a1a3c102bf95c5339c9e985b26b823a21]
+---
+ fdtput.c | 8 +++++---
+ libfdt/fdt_overlay.c | 3 ++-
+ meson.build | 3 ++-
+ 3 files changed, 9 insertions(+), 5 deletions(-)
+
+diff --git a/fdtput.c b/fdtput.c
+index c2fecf4..8deec7e 100644
+--- a/fdtput.c
++++ b/fdtput.c
+@@ -230,19 +230,21 @@ static int create_paths(char **blob, const char *in_path)
+ static int create_node(char **blob, const char *node_name)
+ {
+ int node = 0;
+- char *p;
++ const char *p;
++ char *path = NULL;
+
+ p = strrchr(node_name, '/');
+ if (!p) {
+ report_error(node_name, -1, -FDT_ERR_BADPATH);
+ return -1;
+ }
+- *p = '\0';
+
+ *blob = realloc_node(*blob, p + 1);
+
+ if (p > node_name) {
+- node = fdt_path_offset(*blob, node_name);
++ path = xstrndup(node_name, (size_t)(p - node_name));
++ node = fdt_path_offset(*blob, path);
++ free(path);
+ if (node < 0) {
+ report_error(node_name, -1, node);
+ return -1;
+diff --git a/libfdt/fdt_overlay.c b/libfdt/fdt_overlay.c
+index 5c0c398..75b0619 100644
+--- a/libfdt/fdt_overlay.c
++++ b/libfdt/fdt_overlay.c
+@@ -431,7 +431,8 @@ static int overlay_fixup_phandle(void *fdt, void *fdto, int symbols_off,
+ const char *fixup_str = value;
+ uint32_t path_len, name_len;
+ uint32_t fixup_len;
+- char *sep, *endptr;
++ const char *sep;
++ char *endptr;
+ int poffset, ret;
+
+ fixup_end = memchr(value, '\0', len);
+diff --git a/meson.build b/meson.build
+index 8952e8a..ecb0ae0 100644
+--- a/meson.build
++++ b/meson.build
+@@ -14,7 +14,8 @@ add_project_arguments(
+ '-Wstrict-prototypes',
+ '-Wmissing-prototypes',
+ '-Wredundant-decls',
+- '-Wshadow'
++ '-Wshadow',
++ '-Wdiscarded-qualifiers'
+ ]),
+ language: 'c'
+ )
diff --git a/meta/recipes-kernel/dtc/dtc_1.7.0.bb b/meta/recipes-kernel/dtc/dtc_1.7.0.bb
index 0702fc16dfa..a2f41197fda 100644
--- a/meta/recipes-kernel/dtc/dtc_1.7.0.bb
+++ b/meta/recipes-kernel/dtc/dtc_1.7.0.bb
@@ -12,6 +12,7 @@ SRC_URI = " \
git://git.kernel.org/pub/scm/utils/dtc/dtc.git;branch=main;protocol=https \
file://0001-meson.build-bump-version-to-1.7.0.patch \
file://0002-meson-allow-building-from-shallow-clones.patch \
+ file://0001-Fix-discarded-const-qualifiers.patch \
"
SRCREV = "039a99414e778332d8f9c04cbd3072e1dcc62798"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 49/66] pseudo: Add fix for glibc 2.43
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (47 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 48/66] dtc: backport fix for build with glibc-2.43 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 50/66] yocto-uninative: Update to 5.0 for needed patchelf updates Yoann Congal
` (16 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Richard Purdie <richard.purdie@linuxfoundation.org>
Update to add a fix for a function definition to work with glibc 2.43.
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 7d35b0e7929d666af783db835a3a809f8f6ce429)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-devtools/pseudo/pseudo_git.bb | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/recipes-devtools/pseudo/pseudo_git.bb b/meta/recipes-devtools/pseudo/pseudo_git.bb
index 0f063f18812..3ae560487bd 100644
--- a/meta/recipes-devtools/pseudo/pseudo_git.bb
+++ b/meta/recipes-devtools/pseudo/pseudo_git.bb
@@ -12,7 +12,7 @@ SRC_URI:append:class-nativesdk = " \
file://older-glibc-symbols.patch"
SRC_URI[prebuilt.sha256sum] = "ed9f456856e9d86359f169f46a70ad7be4190d6040282b84c8d97b99072485aa"
-SRCREV = "43cbd8fb4914328094ccdb4bb827d74b1bac2046"
+SRCREV = "56e1f8df4761da60e41812fc32b1de797d1765e9"
S = "${WORKDIR}/git"
PV = "1.9.3+git"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 50/66] yocto-uninative: Update to 5.0 for needed patchelf updates
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (48 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 49/66] pseudo: Add fix for glibc 2.43 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 51/66] yocto-uninative: Update to 5.1 for glibc 2.43 Yoann Congal
` (15 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Michael Halstead <mhalstead@linuxfoundation.org>
Solves some segfaults on relocated qemu-img binaries.
[YOCTO #16003]
Signed-off-by: Michael Halstead <mhalstead@linuxfoundation.org>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
[YC: removed extra line from commit message
upstream commit b322bc5387f3 ("meta/conf/distro/include/yocto-uninative.inc")]
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/conf/distro/include/yocto-uninative.inc | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/meta/conf/distro/include/yocto-uninative.inc b/meta/conf/distro/include/yocto-uninative.inc
index 3ced03d4771..e9dc6c86408 100644
--- a/meta/conf/distro/include/yocto-uninative.inc
+++ b/meta/conf/distro/include/yocto-uninative.inc
@@ -7,9 +7,9 @@
#
UNINATIVE_MAXGLIBCVERSION = "2.42"
-UNINATIVE_VERSION = "4.9"
+UNINATIVE_VERSION = "5.0"
UNINATIVE_URL ?= "http://downloads.yoctoproject.org/releases/uninative/${UNINATIVE_VERSION}/"
-UNINATIVE_CHECKSUM[aarch64] ?= "812045d826b7fda88944055e8526b95a5a9440bfef608d5b53fd52faab49bf85"
-UNINATIVE_CHECKSUM[i686] ?= "5cc28efd0c15a75de4bcb147c6cce65f1c1c9d442173a220f08427f40a3ffa09"
-UNINATIVE_CHECKSUM[x86_64] ?= "4c03d1ed2b7b4e823aca4a1a23d8f2e322f1770fc10e859adcede5777aff4f3a"
+UNINATIVE_CHECKSUM[aarch64] ?= "a25f2174d0cefcb22af005e9bc72ac01ae83b011c5b6d6d5bf00dac979877f76"
+UNINATIVE_CHECKSUM[i686] ?= "959cc2539b692f9b9862825c7324a0fe4d061fca742f6c259f67f581c59af956"
+UNINATIVE_CHECKSUM[x86_64] ?= "96045e8b1e242c8a849426a8506c7043f354b39f2bc0035192780e8205e23e9d"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 51/66] yocto-uninative: Update to 5.1 for glibc 2.43
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (49 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 50/66] yocto-uninative: Update to 5.0 for needed patchelf updates Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 52/66] elfutils: don't add -Werror to avoid discarded-qualifiers Yoann Congal
` (14 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Michael Halstead <mhalstead@linuxfoundation.org>
Signed-off-by: Michael Halstead <mhalstead@linuxfoundation.org>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit c1fb515f2a88fa0a0e95529afc07a99db001af0e)
[YC: Remove duplicated line in commit message]
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/conf/distro/include/yocto-uninative.inc | 10 +++++-----
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/meta/conf/distro/include/yocto-uninative.inc b/meta/conf/distro/include/yocto-uninative.inc
index e9dc6c86408..d97c96f631f 100644
--- a/meta/conf/distro/include/yocto-uninative.inc
+++ b/meta/conf/distro/include/yocto-uninative.inc
@@ -6,10 +6,10 @@
# to the distro running on the build machine.
#
-UNINATIVE_MAXGLIBCVERSION = "2.42"
-UNINATIVE_VERSION = "5.0"
+UNINATIVE_MAXGLIBCVERSION = "2.43"
+UNINATIVE_VERSION = "5.1"
UNINATIVE_URL ?= "http://downloads.yoctoproject.org/releases/uninative/${UNINATIVE_VERSION}/"
-UNINATIVE_CHECKSUM[aarch64] ?= "a25f2174d0cefcb22af005e9bc72ac01ae83b011c5b6d6d5bf00dac979877f76"
-UNINATIVE_CHECKSUM[i686] ?= "959cc2539b692f9b9862825c7324a0fe4d061fca742f6c259f67f581c59af956"
-UNINATIVE_CHECKSUM[x86_64] ?= "96045e8b1e242c8a849426a8506c7043f354b39f2bc0035192780e8205e23e9d"
+UNINATIVE_CHECKSUM[aarch64] ?= "4166237a9dabd222dcb9627a9435dffd756764fabf76ed7ef2e93dc2964567ad"
+UNINATIVE_CHECKSUM[i686] ?= "761502cc9aef4d54d0c6fe9418beb9fdd2c6220da6f2b04128c89f47902ab9ae"
+UNINATIVE_CHECKSUM[x86_64] ?= "2b63a078c26535e0786e87f81ae69509df30f4dce40693004c527bd5e4ab2b85"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 52/66] elfutils: don't add -Werror to avoid discarded-qualifiers
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (50 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 51/66] yocto-uninative: Update to 5.1 for glibc 2.43 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 53/66] binutils: backport patch to fix build with glibc-2.43 on host Yoann Congal
` (13 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Martin Jansa <martin.jansa@gmail.com>
With glibc-2.43 on host elfutils-native fails with:
elfutils-0.191/libcpu/riscv_disasm.c:1259:46: error: initialization discards âconstâ qualifier from pointer target type [-Werror=discarded-qualifiers]
elfutils-0.194 in master doesn't have this issue thanks to this patch avoiding -Werror from:
https://git.openembedded.org/openembedded-core/commit/?id=1d6ac3c811798732e6addc798656bbe104661d77
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../elfutils/elfutils_0.191.bb | 1 +
...001-config-eu.am-do-not-force-Werror.patch | 34 +++++++++++++++++++
2 files changed, 35 insertions(+)
create mode 100644 meta/recipes-devtools/elfutils/files/0001-config-eu.am-do-not-force-Werror.patch
diff --git a/meta/recipes-devtools/elfutils/elfutils_0.191.bb b/meta/recipes-devtools/elfutils/elfutils_0.191.bb
index 0fd6d31af19..5156e5c9f6d 100644
--- a/meta/recipes-devtools/elfutils/elfutils_0.191.bb
+++ b/meta/recipes-devtools/elfutils/elfutils_0.191.bb
@@ -23,6 +23,7 @@ SRC_URI = "https://sourceware.org/elfutils/ftp/${PV}/${BP}.tar.bz2 \
file://0001-tests-Makefile.am-compile-test_nlist-with-standard-C.patch \
file://0001-debuginfod-Remove-unused-variable.patch \
file://0001-srcfiles-fix-unused-variable-BUFFER_SIZE.patch \
+ file://0001-config-eu.am-do-not-force-Werror.patch \
file://CVE-2025-1352.patch \
file://CVE-2025-1365.patch \
file://CVE-2025-1372.patch \
diff --git a/meta/recipes-devtools/elfutils/files/0001-config-eu.am-do-not-force-Werror.patch b/meta/recipes-devtools/elfutils/files/0001-config-eu.am-do-not-force-Werror.patch
new file mode 100644
index 00000000000..d4e141927f1
--- /dev/null
+++ b/meta/recipes-devtools/elfutils/files/0001-config-eu.am-do-not-force-Werror.patch
@@ -0,0 +1,34 @@
+From e169c3fc734be1783b3e1a4768dbec05fb64cb4f Mon Sep 17 00:00:00 2001
+From: Alexander Kanavin <alex@linutronix.de>
+Date: Fri, 22 Nov 2024 12:50:48 +0100
+Subject: [PATCH] config/eu.am: do not force -Werror
+
+This is undesirable when compiler versions may not be the same
+as what upstream is using for their own testing.
+
+Upstream-Status: Inappropriate [oe-core specific]
+Signed-off-by: Alexander Kanavin <alex@linutronix.de>
+---
+ config/eu.am | 2 --
+ 1 file changed, 2 deletions(-)
+
+diff --git a/config/eu.am b/config/eu.am
+index 0b7dab5..5e7a03f 100644
+--- a/config/eu.am
++++ b/config/eu.am
+@@ -99,7 +99,6 @@ AM_CFLAGS = -std=gnu99 -Wall -Wshadow -Wformat=2 \
+ $(LOGICAL_OP_WARNING) $(DUPLICATED_COND_WARNING) \
+ $(NULL_DEREFERENCE_WARNING) $(IMPLICIT_FALLTHROUGH_WARNING) \
+ $(USE_AFTER_FREE3_WARNING) \
+- $(if $($(*F)_no_Werror),,-Werror) \
+ $(if $($(*F)_no_Wunused),,-Wunused -Wextra) \
+ $(if $($(*F)_no_Wstack_usage),,$(STACK_USAGE_WARNING)) \
+ $(if $($(*F)_no_Wpacked_not_aligned),$(NO_PACKED_NOT_ALIGNED_WARNING),) \
+@@ -109,7 +108,6 @@ AM_CXXFLAGS = -std=c++11 -Wall -Wshadow \
+ $(TRAMPOLINES_WARNING) \
+ $(LOGICAL_OP_WARNING) $(DUPLICATED_COND_WARNING) \
+ $(NULL_DEREFERENCE_WARNING) $(IMPLICIT_FALLTHROUGH_WARNING) \
+- $(if $($(*F)_no_Werror),,-Werror) \
+ $(if $($(*F)_no_Wunused),,-Wunused -Wextra) \
+ $(if $($(*F)_no_Wstack_usage),,$(STACK_USAGE_WARNING)) \
+ $(if $($(*F)_no_Wpacked_not_aligned),$(NO_PACKED_NOT_ALIGNED_WARNING),) \
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 53/66] binutils: backport patch to fix build with glibc-2.43 on host
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (51 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 52/66] elfutils: don't add -Werror to avoid discarded-qualifiers Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 54/66] texinfo: Backport patches for hosts with newer GCC Yoann Congal
` (12 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Martin Jansa <martin.jansa@gmail.com>
Fixes:
../../../gprofng/libcollector/linetrace.c: In function ‘__collector_ext_line_install’:
../../../gprofng/libcollector/linetrace.c:219:45: error: expected identifier before ‘_Generic’
219 | if (java_follow_env != NULL && CALL_UTIL (strstr)(java_follow_env, COLLECTOR_JVMTI_OPTION))
| ^~~~~~
../../../gprofng/libcollector/linetrace.c:219:34: note: in expansion of macro ‘CALL_UTIL’
219 | if (java_follow_env != NULL && CALL_UTIL (strstr)(java_follow_env, COLLECTOR_JVMTI_OPTION))
| ^~~~~~~~~
Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../binutils/binutils-2.42.inc | 1 +
...tect-against-standard-library-macros.patch | 31 +++++++++++++++++++
2 files changed, 32 insertions(+)
create mode 100644 meta/recipes-devtools/binutils/binutils/0022-gprofng-protect-against-standard-library-macros.patch
diff --git a/meta/recipes-devtools/binutils/binutils-2.42.inc b/meta/recipes-devtools/binutils/binutils-2.42.inc
index e27502af72e..096ccf42c2a 100644
--- a/meta/recipes-devtools/binutils/binutils-2.42.inc
+++ b/meta/recipes-devtools/binutils/binutils-2.42.inc
@@ -45,6 +45,7 @@ SRC_URI = "\
file://0019-Fix-32097-Warnings-when-building-gprofng-with-Clang.patch \
file://0020-gprofng-fix-std-gnu23-compatibility-wrt-unprototyped.patch \
file://0021-gprofng-fix-build-with-std-gnu23.patch \
+ file://0022-gprofng-protect-against-standard-library-macros.patch \
file://0018-CVE-2025-0840.patch \
file://CVE-2025-1176.patch \
file://CVE-2025-1178.patch \
diff --git a/meta/recipes-devtools/binutils/binutils/0022-gprofng-protect-against-standard-library-macros.patch b/meta/recipes-devtools/binutils/binutils/0022-gprofng-protect-against-standard-library-macros.patch
new file mode 100644
index 00000000000..0fa0a939918
--- /dev/null
+++ b/meta/recipes-devtools/binutils/binutils/0022-gprofng-protect-against-standard-library-macros.patch
@@ -0,0 +1,31 @@
+From 5f66aee7f4bec7a2d8378034116f5e5c3dc50f41 Mon Sep 17 00:00:00 2001
+From: Andreas Schwab <schwab@suse.de>
+Date: Sat, 22 Nov 2025 11:29:43 +0100
+Subject: [PATCH] gprofng: protect against standard library macros
+
+The CALL_UTIL macro can expand to an unparsable expression of the argument
+is a macro, like with the new const-preserving standard library macros in
+C23.
+
+ * gprofng/src/collector_module.h (CALL_UTIL): Add parens to not
+ expand its argument if it is a function-like macro.
+
+Upstream-Status: Backport [2.46 5f66aee7f4bec7a2d8378034116f5e5c3dc50f41]
+Signed-off-by: Martin Jansa <martin.jansa@gmail.com>
+---
+ gprofng/src/collector_module.h | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/gprofng/src/collector_module.h b/gprofng/src/collector_module.h
+index b64d69c45ab..859a6dd1f7d 100644
+--- a/gprofng/src/collector_module.h
++++ b/gprofng/src/collector_module.h
+@@ -119,7 +119,7 @@ typedef struct CollectorUtilFuncs
+ extern CollectorUtilFuncs __collector_util_funcs;
+ extern int __collector_dlsym_guard;
+
+-#define CALL_UTIL(x) __collector_util_funcs.x
++#define CALL_UTIL(x) (__collector_util_funcs.x)
+
+ /* The following constants define the meaning of the "void *arg"
+ * argument of getFrameInfo().
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 54/66] texinfo: Backport patches for hosts with newer GCC
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (52 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 53/66] binutils: backport patch to fix build with glibc-2.43 on host Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 55/66] qemu: backport patches to support python 3.14 Yoann Congal
` (11 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Yoann Congal <yoann.congal@smile.fr>
On Ubuntu 26.04 (Gcc 15.2), texinfo-native fails to build.
Note: it is usually ASSUME_PROVIDED via bitbake.conf.
Backport patches (all included in texinfo-7.3, OE-Core's version) to fix
these errors:
| ../../texinfo-7.0.3/system.h:69:14: error: conflicting types for ‘strerror’; have ‘char *(void)’
| 69 | extern char *strerror ();
| | ^~~~~~~~
| In file included from ../gnulib/lib/string.h:41,
| from ../../texinfo-7.0.3/system.h:34:
| /usr/include/string.h:451:14: note: previous declaration of ‘strerror’ with type ‘char *(int)’
| 451 | extern char *strerror (int __errnum) __THROW;
| | ^~~~~~~~
========================================================
| ../../../../../../../workspace/sources/texinfo-native/info/echo-area.c:176:12: error: too many arguments to function ‘cmd’; expected 0, have 2
| 176 | (*cmd) (the_echo_area, count);
| | ~^~~~~ ~~~~~~~~~~~~~
========================================================
| ../../../../../../../workspace/sources/texinfo-native/info/m-x.c:140:8: error: too many arguments to function ‘command->func’; expected 0, have 3
| 140 | (*command->func) (active_window, count, 0);
| | ~^~~~~~~~~~~~~~~ ~~~~~~~~~~~~~
========================================================
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
...strerror-definition-the-prototype-lo.patch | 27 +++
...tion-CFunction-Remove-unused-typedef.patch | 27 +++
...prototype-for-Info-command-functions.patch | 194 ++++++++++++++++
.../texinfo/0004-Remove-VFunction.patch | 217 ++++++++++++++++++
.../recipes-extended/texinfo/texinfo_7.0.3.bb | 4 +
5 files changed, 469 insertions(+)
create mode 100644 meta/recipes-extended/texinfo/texinfo/0001-system.h-remove-strerror-definition-the-prototype-lo.patch
create mode 100644 meta/recipes-extended/texinfo/texinfo/0002-info-info.h-Function-CFunction-Remove-unused-typedef.patch
create mode 100644 meta/recipes-extended/texinfo/texinfo/0003-Use-explicit-prototype-for-Info-command-functions.patch
create mode 100644 meta/recipes-extended/texinfo/texinfo/0004-Remove-VFunction.patch
diff --git a/meta/recipes-extended/texinfo/texinfo/0001-system.h-remove-strerror-definition-the-prototype-lo.patch b/meta/recipes-extended/texinfo/texinfo/0001-system.h-remove-strerror-definition-the-prototype-lo.patch
new file mode 100644
index 00000000000..1a31b321486
--- /dev/null
+++ b/meta/recipes-extended/texinfo/texinfo/0001-system.h-remove-strerror-definition-the-prototype-lo.patch
@@ -0,0 +1,27 @@
+From 3d202924c8ddd96029129bb745772cb2918a5f10 Mon Sep 17 00:00:00 2001
+From: Patrice Dumas <pertusus@free.fr>
+Date: Sun, 16 Jun 2024 15:10:22 +0200
+Subject: * system.h: remove strerror definition, the prototype looks wrong and
+ the conditional is not set anywhere.
+
+Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/texinfo.git/commit/?id=3d202924c8ddd96029129bb745772cb2918a5f10]
+Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
+---
+ system.h | 4 ----
+ 1 file changed, 4 deletions(-)
+
+diff --git a/system.h b/system.h
+index e32937f16e..7694d85a45 100644
+--- a/system.h
++++ b/system.h
+@@ -65,10 +65,6 @@ extern int errno;
+ #include <perror.h>
+ #endif
+
+-#ifndef HAVE_DECL_STRERROR
+-extern char *strerror ();
+-#endif
+-
+ #include <limits.h>
+
+ #ifndef PATH_MAX
diff --git a/meta/recipes-extended/texinfo/texinfo/0002-info-info.h-Function-CFunction-Remove-unused-typedef.patch b/meta/recipes-extended/texinfo/texinfo/0002-info-info.h-Function-CFunction-Remove-unused-typedef.patch
new file mode 100644
index 00000000000..9ed97b12ffe
--- /dev/null
+++ b/meta/recipes-extended/texinfo/texinfo/0002-info-info.h-Function-CFunction-Remove-unused-typedef.patch
@@ -0,0 +1,27 @@
+From 5e06e9846c44cb5d7b1c937728ba701b4a9d9523 Mon Sep 17 00:00:00 2001
+From: Gavin Smith <gavinsmith0123@gmail.com>
+Date: Sun, 28 Jan 2024 15:45:25 +0000
+Subject: * info/info.h (Function, CFunction): Remove unused typedefs.
+
+Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/texinfo.git/commit/?id=5e06e9846c44cb5d7b1c937728ba701b4a9d9523]
+Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
+---
+ info/info.h | 4 +---
+ 1 file changed, 1 insertion(+), 3 deletions(-)
+
+diff --git a/info/info.h b/info/info.h
+index 8082725146..b1274ef7a4 100644
+--- a/info/info.h
++++ b/info/info.h
+@@ -23,10 +23,8 @@
+ /* System dependencies. */
+ #include "system.h"
+
+-/* Some of our other include files use these. */
+-typedef int Function ();
++/* Some of our other include files use this. */
+ typedef void VFunction ();
+-typedef char *CFunction ();
+
+ #include "string.h"
+ #include "mbiter.h"
diff --git a/meta/recipes-extended/texinfo/texinfo/0003-Use-explicit-prototype-for-Info-command-functions.patch b/meta/recipes-extended/texinfo/texinfo/0003-Use-explicit-prototype-for-Info-command-functions.patch
new file mode 100644
index 00000000000..f955661d520
--- /dev/null
+++ b/meta/recipes-extended/texinfo/texinfo/0003-Use-explicit-prototype-for-Info-command-functions.patch
@@ -0,0 +1,194 @@
+From deb7fb40bcaeaa537b14e0690f0fa78081844481 Mon Sep 17 00:00:00 2001
+From: Patrice Dumas <pertusus@free.fr>
+Date: Mon, 17 Jun 2024 19:26:32 +0200
+Subject: [PATCH] Use explicit prototype for Info command functions
+
+* info/m-x.c (info_execute_command): call command function with two
+arguments only, window and count.
+
+* info/doc.h (InfoCommand), info/echo-area.c
+(read_and_dispatch_in_echo_area, ea_yank_pop)
+(ea_possible_completions), info/info.h (COMMAND_FUNCTION),
+info/makedoc.c (process_one_file), info/session.c
+(info_read_and_dispatch, read_key_sequence), info/terminal.h
+(VFunction): add a function type COMMAND_FUNCTION for pointers on info
+commands function and replace the VFunction untyped generic function
+type. Move VFunction definition to terminal.h.
+
+Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/texinfo.git/commit/?id=2e62ec97bad667f1dd91f1a396f5c0376aef1c03]
+Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
+---
+ info/doc.h | 2 +-
+ info/echo-area.c | 10 +++++-----
+ info/info.h | 4 ++--
+ info/m-x.c | 2 +-
+ info/makedoc.c | 2 +-
+ info/session.c | 8 ++++----
+ info/session.h | 4 ++--
+ info/terminal.h | 2 +-
+ 8 files changed, 17 insertions(+), 17 deletions(-)
+
+diff --git a/info/doc.h b/info/doc.h
+index 26ed41f80c..e9cc2ced0e 100644
+--- a/info/doc.h
++++ b/info/doc.h
+@@ -44,7 +44,7 @@ typedef struct function_keyseq
+ /* Structure describing an Info command. */
+ typedef struct
+ {
+- VFunction *func; /* Pointer to function implementing command. */
++ COMMAND_FUNCTION *func; /* Pointer to function implementing command. */
+ char *func_name; /* Name of this command. */
+ FUNCTION_KEYSEQ *keys; /* Key sequences that could invoke this command. */
+ char *doc; /* Documentation string. */
+diff --git a/info/echo-area.c b/info/echo-area.c
+index f485e43f76..375c66a560 100644
+--- a/info/echo-area.c
++++ b/info/echo-area.c
+@@ -31,7 +31,7 @@ int info_aborted_echo_area = 0;
+ int echo_area_is_active = 0;
+
+ /* The address of the last command executed in the echo area. */
+-static VFunction *ea_last_executed_command = NULL;
++static COMMAND_FUNCTION *ea_last_executed_command = NULL;
+
+ /* Non-zero means that the last command executed while reading input
+ killed some text. */
+@@ -158,7 +158,7 @@ read_and_dispatch_in_echo_area (void)
+ while (1)
+ {
+ int count;
+- VFunction *cmd;
++ COMMAND_FUNCTION *cmd;
+ int lk = 0;
+
+ lk = echo_area_last_command_was_kill;
+@@ -669,8 +669,8 @@ DECLARE_INFO_COMMAND (ea_yank_pop, _("Yank back a previous kill"))
+ {
+ register int len;
+
+- if (((ea_last_executed_command != (VFunction *) ea_yank) &&
+- (ea_last_executed_command != (VFunction *) ea_yank_pop)) ||
++ if (((ea_last_executed_command != ea_yank) &&
++ (ea_last_executed_command != ea_yank_pop)) ||
+ (kill_ring_index == 0))
+ return;
+
+@@ -1166,7 +1166,7 @@ DECLARE_INFO_COMMAND (ea_possible_completions, _("List possible completions"))
+
+ DECLARE_INFO_COMMAND (ea_complete, _("Insert completion"))
+ {
+- if (ea_last_executed_command == (VFunction *) ea_complete)
++ if (ea_last_executed_command == ea_complete)
+ {
+ ea_possible_completions (window, count);
+ return;
+diff --git a/info/info.h b/info/info.h
+index b1274ef7a4..401b0543d3 100644
+--- a/info/info.h
++++ b/info/info.h
+@@ -23,8 +23,8 @@
+ /* System dependencies. */
+ #include "system.h"
+
+-/* Some of our other include files use this. */
+-typedef void VFunction ();
++struct window_struct;
++typedef void COMMAND_FUNCTION (struct window_struct *window, int count);
+
+ #include "string.h"
+ #include "mbiter.h"
+diff --git a/info/m-x.c b/info/m-x.c
+index 669d999738..9a194a1e28 100644
+--- a/info/m-x.c
++++ b/info/m-x.c
+@@ -137,7 +137,7 @@ DECLARE_INFO_COMMAND (info_execute_command,
+ free (line);
+
+ if (command && command->func)
+- (*command->func) (active_window, count, 0);
++ (*command->func) (active_window, count);
+ }
+ }
+
+diff --git a/info/makedoc.c b/info/makedoc.c
+index e7d98d64f9..84ea419d4d 100644
+--- a/info/makedoc.c
++++ b/info/makedoc.c
+@@ -436,7 +436,7 @@ process_one_file (char *filename, FILE *doc_stream, FILE *funs_stream)
+ doc[offset - point] = '\0';
+
+ fprintf (doc_stream,
+- " { (VFunction *)%s, \"%s\", (FUNCTION_KEYSEQ *)0, %s },\n",
++ " { %s, \"%s\", (FUNCTION_KEYSEQ *)0, %s },\n",
+ func, func_name, doc);
+
+ free (func_name);
+diff --git a/info/session.c b/info/session.c
+index 499857ef13..2cb4414326 100644
+--- a/info/session.c
++++ b/info/session.c
+@@ -229,7 +229,7 @@ static int info_keyseq_displayed_p;
+ void
+ info_read_and_dispatch (void)
+ {
+- VFunction *cmd;
++ COMMAND_FUNCTION *cmd;
+ int count;
+
+ for (quit_info_immediately = 0; !quit_info_immediately; )
+@@ -5018,7 +5018,7 @@ incremental_search (WINDOW *window, int count)
+
+ while (isearch_is_active)
+ {
+- VFunction *func = NULL;
++ COMMAND_FUNCTION *func = NULL;
+ int quoted = 0;
+
+ /* Show the search string in the echo area. */
+@@ -5546,7 +5546,7 @@ void info_add_digit_to_numeric_arg (WINDOW *, int count);
+
+ If INSERT, call ea_insert if a printable character was input.
+ */
+-VFunction *
++COMMAND_FUNCTION *
+ read_key_sequence (Keymap map, int menu, int mouse,
+ int insert, int *count)
+ {
+@@ -5554,7 +5554,7 @@ read_key_sequence (Keymap map, int menu, int mouse,
+ int reading_universal_argument = 0;
+
+ int numeric_arg = 1, numeric_arg_sign = 1, *which_explicit_arg;
+- VFunction *func;
++ COMMAND_FUNCTION *func;
+
+ /* Process the right numeric argument. */
+ if (!echo_area_is_active)
+diff --git a/info/session.h b/info/session.h
+index 4606d0a519..94b4935ef0 100644
+--- a/info/session.h
++++ b/info/session.h
+@@ -58,8 +58,8 @@ extern int scroll_last_node;
+ int get_input_key (void);
+ int get_another_input_key (void);
+
+-VFunction *read_key_sequence (Keymap map, int menu, int mouse,
+- int insert, int *count);
++COMMAND_FUNCTION *read_key_sequence (Keymap map, int menu, int mouse,
++ int insert, int *count);
+ unsigned char info_input_pending_p (void);
+ void info_set_node_of_window (WINDOW *window, NODE *node);
+ void info_set_node_of_window_fast (WINDOW *window, NODE *node);
+diff --git a/info/terminal.h b/info/terminal.h
+index 8108b6b6b5..ee881a8bb1 100644
+--- a/info/terminal.h
++++ b/info/terminal.h
+@@ -20,7 +20,7 @@
+ #if !defined (TERMINAL_H)
+ #define TERMINAL_H
+
+-#include "info.h"
++typedef void VFunction ();
+
+ /* For almost every function externally visible from terminal.c, there is
+ a corresponding "hook" function which can be bound in order to replace
diff --git a/meta/recipes-extended/texinfo/texinfo/0004-Remove-VFunction.patch b/meta/recipes-extended/texinfo/texinfo/0004-Remove-VFunction.patch
new file mode 100644
index 00000000000..eb9957c3dcf
--- /dev/null
+++ b/meta/recipes-extended/texinfo/texinfo/0004-Remove-VFunction.patch
@@ -0,0 +1,217 @@
+From 7e8d0093b411729c8c570b25280bef6b55415594 Mon Sep 17 00:00:00 2001
+From: Gavin Smith <gavinsmith0123@gmail.com>
+Date: Fri, 9 Aug 2024 11:05:08 +0100
+Subject: [PATCH] Remove VFunction.
+
+* info/terminal.c, info/terminal.h
+(terminal_begin_blink_hook, terminal_begin_bold_hook)
+(terminal_begin_inverse_hook, terminal_begin_standout_hook)
+(terminal_begin_underline_hook, terminal_clear_screen_hook)
+(terminal_clear_to_eol_hook, terminal_default_colour_hook)
+(terminal_down_line_hook, terminal_end_all_modes_hook)
+(terminal_end_inverse_hook, terminal_end_standout_hook)
+(terminal_end_underline_hook, terminal_get_screen_size_hook)
+(terminal_goto_xy_hook, terminal_initialize_terminal_hook)
+(terminal_new_terminal_hook, terminal_prep_terminal_hook)
+(terminal_put_text_hook, terminal_ring_bell_hook)
+(terminal_scroll_terminal_hook, terminal_set_bgcolour_hook,)
+(terminal_set_colour_hook, terminal_unprep_terminal_hook,)
+(terminal_up_line_hook, terminal_write_chars_hook):
+Declare with explicit variable list.
+(VFunction): Remove.
+
+C23 does not allow a variable list to be left undefined as ().
+Report from Jeffrey Cliff <jeffrey.cliff@gmail.com>.
+
+Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/texinfo.git/commit/?id=7e8d0093b411729c8c570b25280bef6b55415594]
+Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
+---
+ info/terminal.c | 53 +++++++++++++++++++++++++------------------------
+ info/terminal.h | 42 +++++++++++++++++++--------------------
+ 2 files changed, 47 insertions(+), 48 deletions(-)
+
+diff --git a/info/terminal.c b/info/terminal.c
+index 7a9793befc..b6f59ff5c5 100644
+--- a/info/terminal.c
++++ b/info/terminal.c
+@@ -53,32 +53,33 @@ extern int tputs ();
+ function is called when appropriate instead of its namesake. Your
+ function is called with exactly the same arguments that were passed
+ to the namesake function. */
+-VFunction *terminal_begin_inverse_hook = NULL;
+-VFunction *terminal_end_inverse_hook = NULL;
+-VFunction *terminal_begin_standout_hook = NULL;
+-VFunction *terminal_end_standout_hook = NULL;
+-VFunction *terminal_begin_underline_hook = NULL;
+-VFunction *terminal_end_underline_hook = NULL;
+-VFunction *terminal_begin_bold_hook = NULL;
+-VFunction *terminal_begin_blink_hook = NULL;
+-VFunction *terminal_end_all_modes_hook = NULL;
+-VFunction *terminal_default_colour_hook = NULL;
+-VFunction *terminal_set_colour_hook = NULL;
+-VFunction *terminal_set_bgcolour_hook = NULL;
+-VFunction *terminal_prep_terminal_hook = NULL;
+-VFunction *terminal_unprep_terminal_hook = NULL;
+-VFunction *terminal_up_line_hook = NULL;
+-VFunction *terminal_down_line_hook = NULL;
+-VFunction *terminal_clear_screen_hook = NULL;
+-VFunction *terminal_clear_to_eol_hook = NULL;
+-VFunction *terminal_get_screen_size_hook = NULL;
+-VFunction *terminal_goto_xy_hook = NULL;
+-VFunction *terminal_initialize_terminal_hook = NULL;
+-VFunction *terminal_new_terminal_hook = NULL;
+-VFunction *terminal_put_text_hook = NULL;
+-VFunction *terminal_ring_bell_hook = NULL;
+-VFunction *terminal_write_chars_hook = NULL;
+-VFunction *terminal_scroll_terminal_hook = NULL;
++
++void (*terminal_initialize_terminal_hook) (char *terminal_name) = NULL;
++void (*terminal_get_screen_size_hook) (void) = NULL;
++int (*terminal_prep_terminal_hook) (void) = NULL;
++void (*terminal_unprep_terminal_hook) (void) = NULL;
++void (*terminal_new_terminal_hook) (char *terminal_name) = NULL;
++void (*terminal_goto_xy_hook) (int x, int y) = NULL;
++void (*terminal_put_text_hook) (char *string) = NULL;
++void (*terminal_write_chars_hook) (char *string, int nchars) = NULL;
++void (*terminal_clear_to_eol_hook) (void) = NULL;
++void (*terminal_clear_screen_hook) (void) = NULL;
++void (*terminal_up_line_hook) (void) = NULL;
++void (*terminal_down_line_hook) (void) = NULL;
++void (*terminal_begin_inverse_hook) (void) = NULL;
++void (*terminal_end_inverse_hook) (void) = NULL;
++void (*terminal_begin_standout_hook) (void) = NULL;
++void (*terminal_end_standout_hook) (void) = NULL;
++void (*terminal_begin_underline_hook) (void) = NULL;
++void (*terminal_end_underline_hook) (void) = NULL;
++void (*terminal_scroll_terminal_hook) (int start, int end, int amount) = NULL;
++void (*terminal_ring_bell_hook) (void) = NULL;
++void (*terminal_begin_bold_hook) (void) = NULL;
++void (*terminal_begin_blink_hook) (void) = NULL;
++void (*terminal_default_colour_hook) (void) = NULL;
++void (*terminal_set_colour_hook) (int) = NULL;
++void (*terminal_set_bgcolour_hook) (int) = NULL;
++void (*terminal_end_all_modes_hook) (void) = NULL;
+
+ /* User variable 'mouse'. Values can be MP_* constants in terminal.h. */
+ int mouse_protocol = MP_NONE;
+diff --git a/info/terminal.h b/info/terminal.h
+index ee881a8bb1..718d0844a6 100644
+--- a/info/terminal.h
++++ b/info/terminal.h
+@@ -20,8 +20,6 @@
+ #if !defined (TERMINAL_H)
+ #define TERMINAL_H
+
+-typedef void VFunction ();
+-
+ /* For almost every function externally visible from terminal.c, there is
+ a corresponding "hook" function which can be bound in order to replace
+ the functionality of the one found in terminal.c. This is how we go
+@@ -50,87 +48,87 @@ extern int terminal_can_scroll_region;
+ The variables SCREENHEIGHT and SCREENWIDTH are set to the dimensions that
+ this terminal actually has. */
+ extern void terminal_initialize_terminal (char *terminal_name);
+-extern VFunction *terminal_initialize_terminal_hook;
++extern void (*terminal_initialize_terminal_hook) (char *terminal_name);
+
+ /* Return the current screen width and height in the variables
+ SCREENWIDTH and SCREENHEIGHT. */
+ extern void terminal_get_screen_size (void);
+-extern VFunction *terminal_get_screen_size_hook;
++extern void (*terminal_get_screen_size_hook) (void);
+
+ /* Save and restore tty settings. */
+ extern int terminal_prep_terminal (void);
+ extern void terminal_unprep_terminal (void);
+
+-extern VFunction *terminal_prep_terminal_hook;
+-extern VFunction *terminal_unprep_terminal_hook;
++extern int (*terminal_prep_terminal_hook) (void);
++extern void (*terminal_unprep_terminal_hook) (void);
+
+ /* Re-initialize the terminal to TERMINAL_NAME. */
+ extern void terminal_new_terminal (char *terminal_name);
+-extern VFunction *terminal_new_terminal_hook;
++extern void (*terminal_new_terminal_hook) (char *terminal_name);
+
+ /* Move the cursor to the terminal location of X and Y. */
+ extern void terminal_goto_xy (int x, int y);
+-extern VFunction *terminal_goto_xy_hook;
++extern void (*terminal_goto_xy_hook) (int x, int y);
+
+ /* Print STRING to the terminal at the current position. */
+ extern void terminal_put_text (char *string);
+-extern VFunction *terminal_put_text_hook;
++extern void (*terminal_put_text_hook) (char *string);
+
+ /* Print NCHARS from STRING to the terminal at the current position. */
+ extern void terminal_write_chars (char *string, int nchars);
+-extern VFunction *terminal_write_chars_hook;
++extern void (*terminal_write_chars_hook) (char *string, int nchars);
+
+ /* Clear from the current position of the cursor to the end of the line. */
+ extern void terminal_clear_to_eol (void);
+-extern VFunction *terminal_clear_to_eol_hook;
++extern void (*terminal_clear_to_eol_hook) (void);
+
+ /* Clear the entire terminal screen. */
+ extern void terminal_clear_screen (void);
+-extern VFunction *terminal_clear_screen_hook;
++extern void (*terminal_clear_screen_hook) (void);
+
+ /* Move the cursor up one line. */
+ extern void terminal_up_line (void);
+-extern VFunction *terminal_up_line_hook;
++extern void (*terminal_up_line_hook) (void);
+
+ /* Move the cursor down one line. */
+ extern void terminal_down_line (void);
+-extern VFunction *terminal_down_line_hook;
++extern void (*terminal_down_line_hook) (void);
+
+ /* Turn on reverse video if possible. */
+ extern void terminal_begin_inverse (void);
+-extern VFunction *terminal_begin_inverse_hook;
++extern void (*terminal_begin_inverse_hook) (void);
+
+ /* Turn off reverse video if possible. */
+ extern void terminal_end_inverse (void);
+-extern VFunction *terminal_end_inverse_hook;
++extern void (*terminal_end_inverse_hook) (void);
+
+ /* Turn on standout mode if possible. */
+ extern void terminal_begin_standout (void);
+-extern VFunction *terminal_begin_standout_hook;
++extern void (*terminal_begin_standout_hook) (void);
+
+ /* Turn off standout mode if possible. */
+ extern void terminal_end_standout (void);
+-extern VFunction *terminal_end_standout_hook;
++extern void (*terminal_end_standout_hook) (void);
+
+ /* Turn on and off underline mode if possible. */
+ void terminal_begin_underline (void);
+-extern VFunction *terminal_begin_underline_hook;
++extern void (*terminal_begin_underline_hook) (void);
+ void terminal_end_underline (void);
+-extern VFunction *terminal_end_underline_hook;
++extern void (*terminal_end_underline_hook) (void);
+
+ /* Scroll an area of the terminal, starting with the region from START
+ to END, AMOUNT lines. If AMOUNT is negative, the lines are scrolled
+ towards the top of the screen, else they are scrolled towards the
+ bottom of the screen. */
+ extern void terminal_scroll_terminal (int start, int end, int amount);
+-extern VFunction *terminal_scroll_terminal_hook;
++extern void (*terminal_scroll_terminal_hook) (int start, int end, int amount);
+
+ extern void terminal_scroll_region (int start, int end, int amount);
+
+ /* Ring the terminal bell. The bell is run visibly if it both has one and
+ terminal_use_visible_bell_p is non-zero. */
+ extern void terminal_ring_bell (void);
+-extern VFunction *terminal_ring_bell_hook;
++extern void (*terminal_ring_bell_hook) (void);
+
+ /* The key sequences output by special keys, if this terminal has any. */
+ extern char *term_ku, *term_kd, *term_kr, *term_kl;
diff --git a/meta/recipes-extended/texinfo/texinfo_7.0.3.bb b/meta/recipes-extended/texinfo/texinfo_7.0.3.bb
index b149177b72d..849dca433b9 100644
--- a/meta/recipes-extended/texinfo/texinfo_7.0.3.bb
+++ b/meta/recipes-extended/texinfo/texinfo_7.0.3.bb
@@ -33,6 +33,10 @@ SRC_URI = "${GNU_MIRROR}/texinfo/${BP}.tar.gz \
file://link-zip.patch \
file://dont-depend-on-help2man.patch \
${TARGET_PATCH} \
+ file://0001-system.h-remove-strerror-definition-the-prototype-lo.patch \
+ file://0002-info-info.h-Function-CFunction-Remove-unused-typedef.patch \
+ file://0003-Use-explicit-prototype-for-Info-command-functions.patch \
+ file://0004-Remove-VFunction.patch \
"
SRC_URI[sha256sum] = "3cc5706fb086b895e1dc2b407aade9f95a3a233ff856273e2b659b089f117683"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 55/66] qemu: backport patches to support python 3.14
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (53 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 54/66] texinfo: Backport patches for hosts with newer GCC Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 56/66] db: Pin to use C99 std Yoann Congal
` (10 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Yoann Congal <yoann.congal@smile.fr>
We use QEMU QMP python module to drive qemu in testimage. QMP uses
asyncIO and the method to get the event loop changed.
Backport the patches handling the depreciation to fix the error:
ERROR: core-image-minimal-1.0-r0 do_testimage: Error executing a python function in exec_func_python() autogenerated:
The stack trace of python calls that resulted in this exception/failure was:
File: 'exec_func_python() autogenerated', lineno: 2, function: <module>
*** 0002:do_testimage(d)
...
File: '.../openembedded-core/meta/lib/oeqa/utils/qemurunner.py', lineno: 332, function: launch
0331: from qmp.legacy import QEMUMonitorProtocol
*** 0332: self.qmp = QEMUMonitorProtocol(os.path.basename(qmp_port))
File: '.../build-ubuntu2604/tmp-glibc/work/qemux86_64-oe-linux/core-image-minimal/1.0/recipe-sysroot-native/usr/lib/qemu-python/qmp/legacy.py', lineno: 89, function: __init__
*** 0089: self._aloop = asyncio.get_event_loop()
File: '/usr/lib/python3.14/asyncio/events.py', lineno: 715, function: get_event_loop
0711:
0712: Returns an instance of EventLoop or raises an exception.
0713: """
0714: if self._local._loop is None:
*** 0715: raise RuntimeError('There is no current event loop in thread %r.'
0716: % threading.current_thread().name)
0717:
0718: return self._local._loop
Exception: RuntimeError: There is no current event loop in thread 'MainThread'.
Both patches are in Qemu 10.2 (OE Core master version)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/recipes-devtools/qemu/qemu.inc | 2 +
...Remove-deprecated-get_event_loop-cal.patch | 92 ++++++++
...avoid-creating-additional-event-loop.patch | 199 ++++++++++++++++++
3 files changed, 293 insertions(+)
create mode 100644 meta/recipes-devtools/qemu/qemu/0001-python-backport-Remove-deprecated-get_event_loop-cal.patch
create mode 100644 meta/recipes-devtools/qemu/qemu/0002-python-backport-avoid-creating-additional-event-loop.patch
diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc
index 748a32215e0..54644dd9241 100644
--- a/meta/recipes-devtools/qemu/qemu.inc
+++ b/meta/recipes-devtools/qemu/qemu.inc
@@ -43,6 +43,8 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \
file://qemu-guest-agent.udev \
file://CVE-2024-8354.patch \
file://CVE-2025-12464.patch \
+ file://0001-python-backport-Remove-deprecated-get_event_loop-cal.patch \
+ file://0002-python-backport-avoid-creating-additional-event-loop.patch \
"
UPSTREAM_CHECK_REGEX = "qemu-(?P<pver>\d+(\.\d+)+)\.tar"
diff --git a/meta/recipes-devtools/qemu/qemu/0001-python-backport-Remove-deprecated-get_event_loop-cal.patch b/meta/recipes-devtools/qemu/qemu/0001-python-backport-Remove-deprecated-get_event_loop-cal.patch
new file mode 100644
index 00000000000..7a564513c03
--- /dev/null
+++ b/meta/recipes-devtools/qemu/qemu/0001-python-backport-Remove-deprecated-get_event_loop-cal.patch
@@ -0,0 +1,92 @@
+From 120d060528d02e24b68ac06b44de34fb206b4319 Mon Sep 17 00:00:00 2001
+From: John Snow <jsnow@redhat.com>
+Date: Tue, 13 Aug 2024 09:35:30 -0400
+Subject: [PATCH] python: backport 'Remove deprecated get_event_loop calls'
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+This method was deprecated in 3.12 because it ordinarily should not be
+used from coroutines; if there is not a currently running event loop,
+this automatically creates a new event loop - which is usually not what
+you want from code that would ever run in the bottom half.
+
+In our case, we do want this behavior in two places:
+
+(1) The synchronous shim, for convenience: this allows fully sync
+programs to use QEMUMonitorProtocol() without needing to set up an event
+loop beforehand. This is intentional to fully box in the async
+complexities into the legacy sync shim.
+
+(2) The qmp_tui shell; instead of relying on asyncio.run to create and
+run an asyncio program, we need to be able to pass the current asyncio
+loop to urwid setup functions. For convenience, again, we create one if
+one is not present to simplify the creation of the TUI appliance.
+
+The remaining user of get_event_loop() was in fact one of the erroneous
+users that should not have been using this function: if there's no
+running event loop inside of a coroutine, you're in big trouble :)
+
+Signed-off-by: John Snow <jsnow@redhat.com>
+cherry picked from commit python-qemu-qmp@aa1ff9907603a3033296027e1bd021133df86ef1
+Signed-off-by: John Snow <jsnow@redhat.com>
+Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
+Upstream-Status: Backport [https://gitlab.com/qemu-project/qemu/-/commit/5d99044d09db0fa8c2b3294e301927118f9effc9]
+Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
+---
+ python/qemu/qmp/legacy.py | 9 ++++++++-
+ python/qemu/qmp/qmp_tui.py | 7 ++++++-
+ python/tests/protocol.py | 2 +-
+ 3 files changed, 15 insertions(+), 3 deletions(-)
+
+diff --git a/python/qemu/qmp/legacy.py b/python/qemu/qmp/legacy.py
+index 22a2b5616ef..ea9b8032c3b 100644
+--- a/python/qemu/qmp/legacy.py
++++ b/python/qemu/qmp/legacy.py
+@@ -86,7 +86,14 @@ def __init__(self,
+ "server argument should be False when passing a socket")
+
+ self._qmp = QMPClient(nickname)
+- self._aloop = asyncio.get_event_loop()
++
++ try:
++ self._aloop = asyncio.get_running_loop()
++ except RuntimeError:
++ # No running loop; since this is a sync shim likely to be
++ # used in fully sync programs, create one if neccessary.
++ self._aloop = asyncio.get_event_loop_policy().get_event_loop()
++
+ self._address = address
+ self._timeout: Optional[float] = None
+
+diff --git a/python/qemu/qmp/qmp_tui.py b/python/qemu/qmp/qmp_tui.py
+index 2d9ebbd20bc..d11b9fc547b 100644
+--- a/python/qemu/qmp/qmp_tui.py
++++ b/python/qemu/qmp/qmp_tui.py
+@@ -377,7 +377,12 @@ def run(self, debug: bool = False) -> None:
+ screen = urwid.raw_display.Screen()
+ screen.set_terminal_properties(256)
+
+- self.aloop = asyncio.get_event_loop()
++ try:
++ self.aloop = asyncio.get_running_loop()
++ except RuntimeError:
++ # No running asyncio event loop. Create one if necessary.
++ self.aloop = asyncio.get_event_loop_policy().get_event_loop()
++
+ self.aloop.set_debug(debug)
+
+ # Gracefully handle SIGTERM and SIGINT signals
+diff --git a/python/tests/protocol.py b/python/tests/protocol.py
+index 56c4d441f9c..8dcef573b6c 100644
+--- a/python/tests/protocol.py
++++ b/python/tests/protocol.py
+@@ -228,7 +228,7 @@ def async_test(async_test_method):
+ Decorator; adds SetUp and TearDown to async tests.
+ """
+ async def _wrapper(self, *args, **kwargs):
+- loop = asyncio.get_event_loop()
++ loop = asyncio.get_running_loop()
+ loop.set_debug(True)
+
+ await self._asyncSetUp()
diff --git a/meta/recipes-devtools/qemu/qemu/0002-python-backport-avoid-creating-additional-event-loop.patch b/meta/recipes-devtools/qemu/qemu/0002-python-backport-avoid-creating-additional-event-loop.patch
new file mode 100644
index 00000000000..d893c10c420
--- /dev/null
+++ b/meta/recipes-devtools/qemu/qemu/0002-python-backport-avoid-creating-additional-event-loop.patch
@@ -0,0 +1,199 @@
+From f25eb62190a6fa170db24584fe6225cd0dcd64ad Mon Sep 17 00:00:00 2001
+From: John Snow <jsnow@redhat.com>
+Date: Wed, 3 Sep 2025 01:06:30 -0400
+Subject: [PATCH] python: backport 'avoid creating additional event loops per
+ thread'
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+This commit is two backports squashed into one to avoid regressions.
+
+python: *really* remove get_event_loop
+
+A prior commit, aa1ff990, switched away from using get_event_loop *by
+default*, but this is not good enough to avoid deprecation warnings as
+`asyncio.get_event_loop_policy().get_event_loop()` is *also*
+deprecated. Replace this mechanism with explicit calls to
+asyncio.get_new_loop() and revise the cleanup mechanisms in __del__ to
+match.
+
+python: avoid creating additional event loops per thread
+
+"Too hasty by far!", commit 21ce2ee4 attempted to avoid deprecated
+behavior altogether by calling new_event_loop() directly if there was no
+loop currently running, but this has the unfortunate side effect of
+potentially creating multiple event loops per thread if tests
+instantiate multiple QMP connections in a single thread. This behavior
+is apparently not well-defined and causes problems in some, but not all,
+combinations of Python interpreter version and platform environment.
+
+Partially revert to Daniel Berrange's original patch, which calls
+get_event_loop and simply suppresses the deprecation warning in
+Python<=3.13. This time, however, additionally register new loops
+created with new_event_loop() so that future calls to get_event_loop()
+will return the loop already created.
+
+Reported-by: Richard W.M. Jones <rjones@redhat.com>
+Reported-by: Daniel P. Berrangé <berrange@redhat.com>
+Signed-off-by: John Snow <jsnow@redhat.com>
+cherry picked from commit python-qemu-qmp@21ce2ee4f2df87efe84a27b9c5112487f4670622
+cherry picked from commit python-qemu-qmp@c08fb82b38212956ccffc03fc6d015c3979f42fe
+Signed-off-by: John Snow <jsnow@redhat.com>
+Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
+Upstream-Status: Backport [https://gitlab.com/qemu-project/qemu/-/commit/85f223e5b031eb8ab63fbca314a4fb296a3a2632]
+Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
+---
+ python/qemu/qmp/legacy.py | 46 +++++++++++++++++++++++---------------
+ python/qemu/qmp/qmp_tui.py | 10 ++-------
+ python/qemu/qmp/util.py | 27 ++++++++++++++++++++++
+ 3 files changed, 57 insertions(+), 26 deletions(-)
+
+diff --git a/python/qemu/qmp/legacy.py b/python/qemu/qmp/legacy.py
+index ea9b8032c3b..c732212c048 100644
+--- a/python/qemu/qmp/legacy.py
++++ b/python/qemu/qmp/legacy.py
+@@ -38,6 +38,7 @@
+ from .error import QMPError
+ from .protocol import Runstate, SocketAddrT
+ from .qmp_client import QMPClient
++from .util import get_or_create_event_loop
+
+
+ #: QMPMessage is an entire QMP message of any kind.
+@@ -86,17 +87,13 @@ def __init__(self,
+ "server argument should be False when passing a socket")
+
+ self._qmp = QMPClient(nickname)
+-
+- try:
+- self._aloop = asyncio.get_running_loop()
+- except RuntimeError:
+- # No running loop; since this is a sync shim likely to be
+- # used in fully sync programs, create one if neccessary.
+- self._aloop = asyncio.get_event_loop_policy().get_event_loop()
+-
+ self._address = address
+ self._timeout: Optional[float] = None
+
++ # This is a sync shim intended for use in fully synchronous
++ # programs. Create and set an event loop if necessary.
++ self._aloop = get_or_create_event_loop()
++
+ if server:
+ assert not isinstance(self._address, socket.socket)
+ self._sync(self._qmp.start_server(self._address))
+@@ -310,17 +307,30 @@ def send_fd_scm(self, fd: int) -> None:
+ self._qmp.send_fd_scm(fd)
+
+ def __del__(self) -> None:
+- if self._qmp.runstate == Runstate.IDLE:
+- return
++ if self._qmp.runstate != Runstate.IDLE:
++ self._qmp.logger.warning(
++ "QEMUMonitorProtocol object garbage collected without a prior "
++ "call to close()"
++ )
+
+ if not self._aloop.is_running():
+- self.close()
+- else:
+- # Garbage collection ran while the event loop was running.
+- # Nothing we can do about it now, but if we don't raise our
+- # own error, the user will be treated to a lot of traceback
+- # they might not understand.
++ if self._qmp.runstate != Runstate.IDLE:
++ # If the user neglected to close the QMP session and we
++ # are not currently running in an asyncio context, we
++ # have the opportunity to close the QMP session. If we
++ # do not do this, the error messages presented over
++ # dangling async resources may not make any sense to the
++ # user.
++ self.close()
++
++ if self._qmp.runstate != Runstate.IDLE:
++ # If QMP is still not quiesced, it means that the garbage
++ # collector ran from a context within the event loop and we
++ # are simply too late to take any corrective action. Raise
++ # our own error to give meaningful feedback to the user in
++ # order to prevent pages of asyncio stacktrace jargon.
+ raise QMPError(
+- "QEMUMonitorProtocol.close()"
+- " was not called before object was garbage collected"
++ "QEMUMonitorProtocol.close() was not called before object was "
++ "garbage collected, and could not be closed due to GC running "
++ "in the event loop"
+ )
+diff --git a/python/qemu/qmp/qmp_tui.py b/python/qemu/qmp/qmp_tui.py
+index d11b9fc547b..76e540931c7 100644
+--- a/python/qemu/qmp/qmp_tui.py
++++ b/python/qemu/qmp/qmp_tui.py
+@@ -40,7 +40,7 @@
+ from .message import DeserializationError, Message, UnexpectedTypeError
+ from .protocol import ConnectError, Runstate
+ from .qmp_client import ExecInterruptedError, QMPClient
+-from .util import create_task, pretty_traceback
++from .util import get_or_create_event_loop, create_task, pretty_traceback
+
+
+ # The name of the signal that is used to update the history list
+@@ -376,13 +376,7 @@ def run(self, debug: bool = False) -> None:
+ """
+ screen = urwid.raw_display.Screen()
+ screen.set_terminal_properties(256)
+-
+- try:
+- self.aloop = asyncio.get_running_loop()
+- except RuntimeError:
+- # No running asyncio event loop. Create one if necessary.
+- self.aloop = asyncio.get_event_loop_policy().get_event_loop()
+-
++ self.aloop = get_or_create_event_loop()
+ self.aloop.set_debug(debug)
+
+ # Gracefully handle SIGTERM and SIGINT signals
+diff --git a/python/qemu/qmp/util.py b/python/qemu/qmp/util.py
+index ca6225e9cda..213f09c6528 100644
+--- a/python/qemu/qmp/util.py
++++ b/python/qemu/qmp/util.py
+@@ -20,6 +20,7 @@
+ TypeVar,
+ cast,
+ )
++import warnings
+
+
+ T = TypeVar('T')
+@@ -30,6 +31,32 @@
+ # --------------------------
+
+
++def get_or_create_event_loop() -> asyncio.AbstractEventLoop:
++ """
++ Return this thread's current event loop, or create a new one.
++
++ This function behaves similarly to asyncio.get_event_loop() in
++ Python<=3.13, where if there is no event loop currently associated
++ with the current context, it will create and register one. It should
++ generally not be used in any asyncio-native applications.
++ """
++ try:
++ with warnings.catch_warnings():
++ # Python <= 3.13 will trigger deprecation warnings if no
++ # event loop is set, but will create and set a new loop.
++ warnings.simplefilter("ignore")
++ loop = asyncio.get_event_loop()
++ except RuntimeError:
++ # Python 3.14+: No event loop set for this thread,
++ # create and set one.
++ loop = asyncio.new_event_loop()
++ # Set this loop as the current thread's loop, to be returned
++ # by calls to get_event_loop() in the future.
++ asyncio.set_event_loop(loop)
++
++ return loop
++
++
+ async def flush(writer: asyncio.StreamWriter) -> None:
+ """
+ Utility function to ensure a StreamWriter is *fully* drained.
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 56/66] db: Pin to use C99 std
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (54 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 55/66] qemu: backport patches to support python 3.14 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 57/66] apt: Fix build with GCC 15 Yoann Congal
` (9 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Khem Raj <raj.khem@gmail.com>
GCC-15 has switched to using C23 by default, we have been selectively
disabling warnings as errors to get by, however with autoconf 2.72 adding
-std=gnu23 it now gets enabled for every compiler and clang-22 is more
obidient and has dropped support for K&R C completely. db5 code has a lot
of K&R C prototypes and it starts to fail vigorously. We can not keep
working around with out uplifting sources to be compliant with newer C
standard like C23.
Therefore pin the cflags to use C99 standard as this package expects.
Drop the code to disable warnings as errors selectively instead add a
fix for addressing implicit int warnings
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
(cherry picked from commit 8615b3388b97a56096b959dea4d7499e03187100)
[YC: switched from CFLAGS += to CFLAGS:append]
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../db/0001-Fix-implicit-int-warnings.patch | 106 ++++++++++++++++++
meta/recipes-support/db/db_5.3.28.bb | 9 +-
2 files changed, 111 insertions(+), 4 deletions(-)
create mode 100644 meta/recipes-support/db/db/0001-Fix-implicit-int-warnings.patch
diff --git a/meta/recipes-support/db/db/0001-Fix-implicit-int-warnings.patch b/meta/recipes-support/db/db/0001-Fix-implicit-int-warnings.patch
new file mode 100644
index 00000000000..5cca6dffa11
--- /dev/null
+++ b/meta/recipes-support/db/db/0001-Fix-implicit-int-warnings.patch
@@ -0,0 +1,106 @@
+From c744b20658641b46cf66429f573240b1b5737872 Mon Sep 17 00:00:00 2001
+From: Khem Raj <khem.raj@oss.qualcomm.com>
+Date: Wed, 8 Apr 2026 08:52:55 -0700
+Subject: [PATCH] Fix implicit int warnings
+
+Newer compilers flag this warning which results in configure tests
+failing especially seen on native builds where AC_TRY_RUN is
+being used to detect mutex support.
+
+Also see
+https://sources.debian.org/src/db5.3/5.3.28%2Bdfsg2-11/debian/patches/014-implicit-int.patch
+
+Upstream-Status: Inappropriate [Inactive Upstream]
+Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
+---
+ dist/aclocal/mutex.m4 | 20 ++++++++++----------
+ 1 file changed, 10 insertions(+), 10 deletions(-)
+
+diff --git a/dist/aclocal/mutex.m4 b/dist/aclocal/mutex.m4
+index 81f1ea8..8476f39 100644
+--- a/dist/aclocal/mutex.m4
++++ b/dist/aclocal/mutex.m4
+@@ -5,7 +5,7 @@ AC_DEFUN(AM_PTHREADS_SHARED, [
+ AC_TRY_RUN([
+ #include <stdlib.h>
+ #include <pthread.h>
+-main() {
++int main() {
+ pthread_cond_t cond;
+ pthread_mutex_t mutex;
+ pthread_condattr_t condattr;
+@@ -49,7 +49,7 @@ AC_DEFUN(AM_PTHREADS_PRIVATE, [
+ AC_TRY_RUN([
+ #include <stdlib.h>
+ #include <pthread.h>
+-main() {
++int main() {
+ pthread_cond_t cond;
+ pthread_mutex_t mutex;
+ pthread_condattr_t condattr;
+@@ -89,13 +89,13 @@ AC_DEFUN(AM_PTHREADS_CONDVAR_DUPINITCHK, [
+ AC_TRY_RUN([
+ #include <stdlib.h>
+ #include <pthread.h>
+-main() {
++int main() {
+ pthread_cond_t cond;
+ pthread_condattr_t condattr;
+ exit(pthread_condattr_init(&condattr) ||
+ pthread_cond_init(&cond, &condattr) ||
+ pthread_cond_init(&cond, &condattr));
+-}], [db_cv_pthread_condinit_dupgood="yes"],
++}], [db_cv_pthread_condinit_dupgood="yes"],
+ [db_cv_pthread_condinit_dupgood="no"],
+ AC_TRY_LINK([
+ #include <stdlib.h>
+@@ -104,19 +104,19 @@ AC_TRY_LINK([
+ pthread_condattr_t condattr;
+ exit(pthread_condattr_init(&condattr) ||
+ pthread_cond_init(&cond, &condattr));
+-], [db_cv_pthread_condinit_dupgood="yes"],
++], [db_cv_pthread_condinit_dupgood="yes"],
+ [db_cv_pthread_condinit_dupgood="no"]))])
+ AC_DEFUN(AM_PTHREADS_RWLOCKVAR_DUPINITCHK, [
+ AC_TRY_RUN([
+ #include <stdlib.h>
+ #include <pthread.h>
+-main() {
++int main() {
+ pthread_rwlock_t rwlock;
+ pthread_rwlockattr_t rwlockattr;
+ exit(pthread_rwlockattr_init(&rwlockattr) ||
+ pthread_rwlock_init(&rwlock, &rwlockattr) ||
+ pthread_rwlock_init(&rwlock, &rwlockattr));
+-}], [db_cv_pthread_rwlockinit_dupgood="yes"],
++}], [db_cv_pthread_rwlockinit_dupgood="yes"],
+ [db_cv_pthread_rwlockinit_dupgood="no"],
+ AC_TRY_LINK([
+ #include <stdlib.h>
+@@ -125,7 +125,7 @@ AC_TRY_LINK([
+ pthread_rwlockattr_t rwlockattr;
+ exit(pthread_rwlockattr_init(&rwlockattr) ||
+ pthread_rwlock_init(&rwlock, &rwlockattr));
+-], [db_cv_pthread_rwlockinit_dupgood="yes"],
++], [db_cv_pthread_rwlockinit_dupgood="yes"],
+ [db_cv_pthread_rwlockinit_dupgood="no"]))])
+
+ # Figure out mutexes for this compiler/architecture.
+@@ -207,7 +207,7 @@ if test "$db_cv_mutex" = no; then
+ ;;
+ esac
+ # We probe for private pthreads only when the user has asked for posix
+- # mutexes and we don't have a multiprocess pthreads library available.
++ # mutexes and we don't have a multiprocess pthreads library available.
+ if test "$db_cv_mutex" = posix_only; then
+ AM_PTHREADS_PRIVATE(POSIX/pthreads/private)
+ AM_PTHREADS_CONDVAR_DUPINITCHK
+@@ -571,7 +571,7 @@
+
+ # UNIX fcntl system call mutexes.
+ # Note that fcntl mutexes are no longer supported as of 4.8. This code has been
+-# left in place in case there is some system that we are not aware of that
++# left in place in case there is some system that we are not aware of that
+ # only uses fcntl mutexes. In that case, contact Oracle for support.
+ if test "$db_cv_mutex" = no; then
+ db_cv_mutex=UNIX/fcntl
diff --git a/meta/recipes-support/db/db_5.3.28.bb b/meta/recipes-support/db/db_5.3.28.bb
index a7d061e0da3..2f21d153c27 100644
--- a/meta/recipes-support/db/db_5.3.28.bb
+++ b/meta/recipes-support/db/db_5.3.28.bb
@@ -27,6 +27,7 @@ SRC_URI += "file://fix-parallel-build.patch \
file://sequence-type.patch \
file://0001-Fix-libc-compatibility-by-renaming-atomic_init-API.patch \
file://0001-clock-Do-not-define-own-timespec.patch \
+ file://0001-Fix-implicit-int-warnings.patch \
"
# We are not interested in official latest 6.x versions;
# let's track what debian is using.
@@ -72,7 +73,11 @@ AUTOTOOLS_SCRIPT_PATH = "${S}/dist"
# configure.
CONFIG_SITE = ""
+CFLAGS:append = " -std=gnu99"
+
oe_runconf:prepend() {
+ export CFLAGS="${CFLAGS}"
+
. ${S}/dist/RELEASE
# Edit version information we couldn't pre-compute.
sed -i -e "s/__EDIT_DB_VERSION_FAMILY__/$DB_VERSION_FAMILY/g" \
@@ -116,7 +121,3 @@ INSANE_SKIP:${PN} = "dev-so"
INSANE_SKIP:${PN}-cxx = "dev-so"
BBCLASSEXTEND = "native nativesdk"
-
-# many configure tests are failing with gcc-14
-CFLAGS += "-Wno-error=implicit-int -Wno-error=implicit-function-declaration"
-BUILD_CFLAGS += "-Wno-error=implicit-int -Wno-error=implicit-function-declaration"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 57/66] apt: Fix build with GCC 15
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (55 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 56/66] db: Pin to use C99 std Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 58/66] lib/oeqa/utils/httpserver: use multiprocessing from bb Yoann Congal
` (8 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit ac53f79999bb8301380d7c58025f6fed75e40c9a)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
...l-Add-missing-include-cstdint-gcc-15.patch | 26 +++++++++++++++++++
meta/recipes-devtools/apt/apt_2.6.1.bb | 1 +
2 files changed, 27 insertions(+)
create mode 100644 meta/recipes-devtools/apt/apt/0001-strutl-Add-missing-include-cstdint-gcc-15.patch
diff --git a/meta/recipes-devtools/apt/apt/0001-strutl-Add-missing-include-cstdint-gcc-15.patch b/meta/recipes-devtools/apt/apt/0001-strutl-Add-missing-include-cstdint-gcc-15.patch
new file mode 100644
index 00000000000..b86ed8bb92d
--- /dev/null
+++ b/meta/recipes-devtools/apt/apt/0001-strutl-Add-missing-include-cstdint-gcc-15.patch
@@ -0,0 +1,26 @@
+From 9da1b0dbdcc90455bc9de49f73a96e7d18f83493 Mon Sep 17 00:00:00 2001
+From: Julian Andres Klode <julian.klode@canonical.com>
+Date: Tue, 18 Feb 2025 10:29:40 +0100
+Subject: [PATCH] strutl: Add missing #include <cstdint> [gcc 15]
+
+Closes: #1096322
+
+Upstream-Status: Backport [https://salsa.debian.org/apt-team/apt/-/commit/f82dcd7e4ebb3f70d28e9feb3621676f8c0cc024]
+
+Signed-off-by: Khem Raj <raj.khem@gmail.com>
+---
+ apt-pkg/contrib/strutl.cc | 1 +
+ 1 file changed, 1 insertion(+)
+
+diff --git a/apt-pkg/contrib/strutl.cc b/apt-pkg/contrib/strutl.cc
+index 67100f1..c0a1cbc 100644
+--- a/apt-pkg/contrib/strutl.cc
++++ b/apt-pkg/contrib/strutl.cc
+@@ -26,6 +26,7 @@
+
+ #include <algorithm>
+ #include <array>
++#include <cstdint>
+ #include <iomanip>
+ #include <limits>
+ #include <locale>
diff --git a/meta/recipes-devtools/apt/apt_2.6.1.bb b/meta/recipes-devtools/apt/apt_2.6.1.bb
index e688d30cae8..436e2e8cade 100644
--- a/meta/recipes-devtools/apt/apt_2.6.1.bb
+++ b/meta/recipes-devtools/apt/apt_2.6.1.bb
@@ -14,6 +14,7 @@ SRC_URI = "${DEBIAN_MIRROR}/main/a/apt/${BPN}_${PV}.tar.xz \
file://0001-Hide-fstatat64-and-prlimit64-defines-on-musl.patch \
file://0001-aptwebserver.cc-Include-array.patch \
file://0001-Remove-using-std-binary_function.patch \
+ file://0001-strutl-Add-missing-include-cstdint-gcc-15.patch \
"
SRC_URI:append:class-native = " \
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 58/66] lib/oeqa/utils/httpserver: use multiprocessing from bb
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (56 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 57/66] apt: Fix build with GCC 15 Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 59/66] archiver: Don't try to preserve all attributes when copying files Yoann Congal
` (7 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Richard Purdie <richard.purdie@linuxfoundation.org>
Fixes build with python-3.14 (and hence on Fedora 43)
It was added to bitbake in 62be9113d98fccb347c6aa0a10d5c4ee2857f8b6
and oe-core now requires latest bitbake already, so we can use this.
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 3ed1cef082b8ef0fa05684f7a41f0842150811bd)
[YC: bitbake commit was backported as 15d7448e04aa ("Use a "fork" multiprocessing context")
in the 2.8(scarthgap) branch]
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/lib/oeqa/utils/httpserver.py | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/lib/oeqa/utils/httpserver.py b/meta/lib/oeqa/utils/httpserver.py
index 80752c13770..9e61cd89d5a 100644
--- a/meta/lib/oeqa/utils/httpserver.py
+++ b/meta/lib/oeqa/utils/httpserver.py
@@ -6,7 +6,7 @@
import http.server
import logging
-import multiprocessing
+from bb import multiprocessing
import os
import signal
from socketserver import ThreadingMixIn
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 59/66] archiver: Don't try to preserve all attributes when copying files
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (57 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 58/66] lib/oeqa/utils/httpserver: use multiprocessing from bb Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:55 ` [OE-core][scarthgap 60/66] selftest/minidebuginfo: extract files from tar archive using tarfile module Yoann Congal
` (6 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Richard Purdie <richard.purdie@linuxfoundation.org>
Similar to https://git.openembedded.org/bitbake/commit/?id=2f35dac0c821ab231459922ed98e1b2cc599ca9a
there is a problem in this code when copying from an NFS mount.
We currently use cp -p, which is a shortcut for --preserve=mode,ownership,timestamps.
We shouldn't need to preserve mode/ownership, only timestamps. Update the code
in the same way the bitbake fetcher was fixed for consistency.
This fixes build failures on OpenSUSE 16.0.
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 6e8313688fa994c82e4c846993ed8da0d1f4db0e)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/classes/archiver.bbclass | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/classes/archiver.bbclass b/meta/classes/archiver.bbclass
index 9d286224d62..9f0a49a418c 100644
--- a/meta/classes/archiver.bbclass
+++ b/meta/classes/archiver.bbclass
@@ -397,7 +397,7 @@ python do_ar_mirror() {
# We now have an appropriate localpath
bb.note('Copying source mirror')
- cmd = 'cp -fpPRH %s %s' % (localpath, destdir)
+ cmd = 'cp --force --preserve=timestamps --no-dereference --recursive -H %s %s' % (localpath, destdir)
subprocess.check_call(cmd, shell=True)
}
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 60/66] selftest/minidebuginfo: extract files from tar archive using tarfile module
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (58 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 59/66] archiver: Don't try to preserve all attributes when copying files Yoann Congal
@ 2026-04-24 20:55 ` Yoann Congal
2026-04-24 20:56 ` [OE-core][scarthgap 61/66] selftest/gdbserver: replace shutil.unpack_archive with tarfile extract Yoann Congal
` (5 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:55 UTC (permalink / raw)
To: openembedded-core
From: Alexander Kanavin <alex@linutronix.de>
Python 3.14 added security checks around archive extraction, and by
default will refuse to handle symlinks with absolute paths. It's possible
to handle this using 'filter' argument, but it is not always available
in older Python versions on various host distributions we need to support,
so let's extract only the needed files directly using tarfile module.
busybox is itself a symlink to busybox.nosuid, so both are extracted.
[YOCTO #16195]
Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit d52d00a3bb4a1ba93e88f1d24d8bb99d6aa321eb)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/lib/oeqa/selftest/cases/minidebuginfo.py | 7 +++++--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/meta/lib/oeqa/selftest/cases/minidebuginfo.py b/meta/lib/oeqa/selftest/cases/minidebuginfo.py
index 2919f079392..07577dce7cc 100644
--- a/meta/lib/oeqa/selftest/cases/minidebuginfo.py
+++ b/meta/lib/oeqa/selftest/cases/minidebuginfo.py
@@ -6,7 +6,7 @@
import os
import subprocess
import tempfile
-import shutil
+import tarfile
from oeqa.selftest.case import OESelftestTestCase
from oeqa.utils.commands import bitbake, get_bb_var, get_bb_vars, runCmd
@@ -32,7 +32,10 @@ IMAGE_FSTYPES = "tar.bz2"
# ".gnu_debugdata" which stores minidebuginfo.
with tempfile.TemporaryDirectory(prefix = "unpackfs-") as unpackedfs:
filename = os.path.join(bb_vars['DEPLOY_DIR_IMAGE'], "{}.tar.bz2".format(bb_vars['IMAGE_LINK_NAME']))
- shutil.unpack_archive(filename, unpackedfs)
+ with tarfile.open(filename) as tar:
+ tar.extract("./bin/busybox", path=unpackedfs)
+ tar.extract("./bin/busybox.nosuid", path=unpackedfs)
+ tar.extract("./lib/libc.so.6", path=unpackedfs)
r = runCmd([bb_vars['READELF'], "-W", "-S", os.path.join(unpackedfs, "bin", "busybox")],
native_sysroot = native_sysroot, target_sys = target_sys)
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 61/66] selftest/gdbserver: replace shutil.unpack_archive with tarfile extract
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (59 preceding siblings ...)
2026-04-24 20:55 ` [OE-core][scarthgap 60/66] selftest/minidebuginfo: extract files from tar archive using tarfile module Yoann Congal
@ 2026-04-24 20:56 ` Yoann Congal
2026-04-24 20:56 ` [OE-core][scarthgap 62/66] license.py: Drop visit_Str from SeenVisitor in selftest Yoann Congal
` (4 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:56 UTC (permalink / raw)
To: openembedded-core
From: Alexander Kanavin <alex@linutronix.de>
This is a followup to
https://lists.openembedded.org/g/openembedded-core/message/233609
as the same issue happened in a different selftest.
[YOCTO #16195]
Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit c7468e70c238b056acbe06ef722b62b02626db8f)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/lib/oeqa/selftest/cases/gdbserver.py | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/meta/lib/oeqa/selftest/cases/gdbserver.py b/meta/lib/oeqa/selftest/cases/gdbserver.py
index 9da97ae7803..9351feaa632 100644
--- a/meta/lib/oeqa/selftest/cases/gdbserver.py
+++ b/meta/lib/oeqa/selftest/cases/gdbserver.py
@@ -7,6 +7,7 @@ import os
import time
import tempfile
import shutil
+import tarfile
import concurrent.futures
from oeqa.selftest.case import OESelftestTestCase
@@ -40,7 +41,8 @@ CORE_IMAGE_EXTRA_INSTALL = "gdbserver"
filename = os.path.join(bb_vars['DEPLOY_DIR_IMAGE'], "%s-dbg.tar.bz2" % bb_vars['IMAGE_LINK_NAME'])
shutil.unpack_archive(filename, debugfs)
filename = os.path.join(bb_vars['DEPLOY_DIR_IMAGE'], "%s.tar.bz2" % bb_vars['IMAGE_LINK_NAME'])
- shutil.unpack_archive(filename, debugfs)
+ with tarfile.open(filename) as tar:
+ tar.extract("./bin/kmod", path=debugfs)
with runqemu("core-image-minimal", runqemuparams="nographic") as qemu:
status, output = qemu.run_serial("kmod --help")
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 62/66] license.py: Drop visit_Str from SeenVisitor in selftest
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (60 preceding siblings ...)
2026-04-24 20:56 ` [OE-core][scarthgap 61/66] selftest/gdbserver: replace shutil.unpack_archive with tarfile extract Yoann Congal
@ 2026-04-24 20:56 ` Yoann Congal
2026-04-24 20:56 ` [OE-core][scarthgap 63/66] sudo: upgrade 1.9.17p1 -> 1.9.17p2 Yoann Congal
` (3 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:56 UTC (permalink / raw)
To: openembedded-core
From: Sunil Dora <sunilkumar.dora@windriver.com>
ast.Str was deprecated in Python 3.8 and removed in Python 3.14.
In [1], visit_Str was already removed from the LicenseVisitor
subclasses (FlattenVisitor, ListVisitor) in oe/license.py since
bitbake now requires Python 3.8+.
However, the test-only SeenVisitor class in the selftest was
missed at that time and still uses visit_Str/node.s. On Python
3.14, ast.Str is fully removed so visit_Str is never called,
causing test_single_licenses to return [] instead of the
expected license list.
Replace visit_Str/node.s with visit_Constant/node.value in
SeenVisitor.
[1] https://git.openembedded.org/openembedded-core/commit/meta/lib/oe/license.py?id=6d3da37adbcaf5a7a3dade08f9d052571b195249
Fixes [YOCTO #16220]
Signed-off-by: Sunil Dora <sunilkumar.dora@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 8a5b019eec72676893507d018e7609745d2e3f49)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
meta/lib/oeqa/selftest/cases/oelib/license.py | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/meta/lib/oeqa/selftest/cases/oelib/license.py b/meta/lib/oeqa/selftest/cases/oelib/license.py
index 5eea12e7619..49b28951f76 100644
--- a/meta/lib/oeqa/selftest/cases/oelib/license.py
+++ b/meta/lib/oeqa/selftest/cases/oelib/license.py
@@ -12,8 +12,8 @@ class SeenVisitor(oe.license.LicenseVisitor):
self.seen = []
oe.license.LicenseVisitor.__init__(self)
- def visit_Str(self, node):
- self.seen.append(node.s)
+ def visit_Constant(self, node):
+ self.seen.append(node.value)
class TestSingleLicense(TestCase):
licenses = [
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 63/66] sudo: upgrade 1.9.17p1 -> 1.9.17p2
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (61 preceding siblings ...)
2026-04-24 20:56 ` [OE-core][scarthgap 62/66] license.py: Drop visit_Str from SeenVisitor in selftest Yoann Congal
@ 2026-04-24 20:56 ` Yoann Congal
2026-04-24 20:56 ` [OE-core][scarthgap 64/66] lttng-ust: upgrade 2.13.8 -> 2.13.10 Yoann Congal
` (2 subsequent siblings)
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:56 UTC (permalink / raw)
To: openembedded-core
From: Daniel Turull <daniel.turull@ericsson.com>
Changelog for sudo: 1.9.17p1 -> 1.9.17p2
============================================================
Merge sudo 1.9.17p2 from branch 'main' into sudo-1.9
[d1b48c651]
* configure, configure.ac:
Fix check for which man page type to use with nroff
Fixes a bug where configure would use *.man instead of *.mdoc on
systems without mandoc. Bug #1077.
[aa2498e46]
* plugins/sudoers/log_client.c:
client_msg_cb: make warning match the function that failed
[f73162df3]
2025-07-23 Todd C. Miller <Todd.Miller@sudo.ws>
* NEWS, configure, configure.ac:
Sudo 1.9.17p2
[f0e1a5ca3]
* plugins/sudoers/match_command.c, plugins/sudoers/match_digest.c:
digest_matches: plug fd leak on snprinf() failure
[26a1a7529]
2025-07-21 Todd C. Miller <Todd.Miller@sudo.ws>
* etc/sudo-logsrvd.pp, etc/sudo-python.pp, etc/sudo.pp,
scripts/mkpkg:
Add a way to override pp_rpm_arch when building rpms
This will be used to build x86_64_v2 packages for Alma Linux.
[55d3c99c4]
* configure, configure.ac:
Fix check for which man page type to use with nroff
Fixes a bug where configure would use *.man instead of *.mdoc on
systems without mandoc.
[2dc10cfbd]
* plugins/sudoers/timestamp.c:
ts_write: call lseek after fruncate on short write
We need to make sure the file position is reset to the old EOF on
error.
[8e7e0e23f]
2025-07-20 Todd C. Miller <Todd.Miller@sudo.ws>
* src/exec_ptrace.c:
ptrace_readv_string: quiet sign-compare warning
[fac2a49e7]
* src/exec_ptrace.c:
ptrace_readv_string: properly handle reads of more than one page
When the intercept and intercept_verify options are enabled and
either argv[] or envp[] contains a string larger than the page size
(usually 4096), ptrace_readv_string() would fill the buffer with
mutiple copies of the same string. Fixes GitHub issue #453.
[2e93eabed]
2025-07-14 Todd C. Miller <Todd.Miller@sudo.ws>
* src/exec_pty.c:
revoke_pty: use killpg() not kill() to send HUP to the process group
Also make sure we never call killpg(-1, SIGHUP), which would send
SIGHUP to process 1 (init). It is possible for cmnd_pid to be -1 in
certain error conditions where sudo killed the command itself. This
may explain GitHub issue #458.
[fb208d383]
2025-07-08 Todd C. Miller <Todd.Miller@sudo.ws>
* etc/sudo-logsrvd.pp, etc/sudo-python.pp, etc/sudo.pp, scripts/pp:
Don't assume RHEL major version is only a single digit
Fixes handling of RHEL 10 and higher.
[e5d953f33]
* plugins/sudoers/visudo.c:
visudo: create temporary file as mod 0600 not 0700
This was due to a typo in the mode field when the temporary file was
created. Noticed by Bjorn Baron of the sudo-rs project.
[1c254b330]
2025-06-30 Todd C. Miller <Todd.Miller@sudo.ws>
* Makefile.in:
We now build sudo releases from git, not mercurial
[cb4e26734]
2025-06-28 Todd C. Miller <Todd.Miller@sudo.ws>
* NEWS, configure, configure.ac:
Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
(cherry picked from commit 12e9ba655153a9cb7c2b79cf52a2300e19634dcf)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../files/0001-sudo.conf.in-fix-conflict-with-multilib.patch | 2 +-
.../sudo/{sudo_1.9.17p1.bb => sudo_1.9.17p2.bb} | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
rename meta/recipes-extended/sudo/{sudo_1.9.17p1.bb => sudo_1.9.17p2.bb} (96%)
diff --git a/meta/recipes-extended/sudo/files/0001-sudo.conf.in-fix-conflict-with-multilib.patch b/meta/recipes-extended/sudo/files/0001-sudo.conf.in-fix-conflict-with-multilib.patch
index 1989c5abd7c..f96ab4b1f6d 100644
--- a/meta/recipes-extended/sudo/files/0001-sudo.conf.in-fix-conflict-with-multilib.patch
+++ b/meta/recipes-extended/sudo/files/0001-sudo.conf.in-fix-conflict-with-multilib.patch
@@ -1,4 +1,4 @@
-From 8c69192754ba73dd6e3273728a21aa73988f4bfb Mon Sep 17 00:00:00 2001
+From 3b9ed5e1ae1e217158af7d9128e35ef3463bc107 Mon Sep 17 00:00:00 2001
From: Kai Kang <kai.kang@windriver.com>
Date: Tue, 17 Nov 2020 11:13:40 +0800
Subject: [PATCH] sudo.conf.in: fix conflict with multilib
diff --git a/meta/recipes-extended/sudo/sudo_1.9.17p1.bb b/meta/recipes-extended/sudo/sudo_1.9.17p2.bb
similarity index 96%
rename from meta/recipes-extended/sudo/sudo_1.9.17p1.bb
rename to meta/recipes-extended/sudo/sudo_1.9.17p2.bb
index 5b9d73b33b1..d715bc2075f 100644
--- a/meta/recipes-extended/sudo/sudo_1.9.17p1.bb
+++ b/meta/recipes-extended/sudo/sudo_1.9.17p2.bb
@@ -7,7 +7,7 @@ SRC_URI = "https://www.sudo.ws/dist/sudo-${PV}.tar.gz \
PAM_SRC_URI = "file://sudo.pam"
-SRC_URI[sha256sum] = "ff607ea717072197738a78f778692cd6df9a7e3e404565f51de063ca27455d32"
+SRC_URI[sha256sum] = "4a38a1ab3adb1199257edc2a7c4a2bd714665eb605b04368843b06dada2cfcfb"
DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}"
RDEPENDS:${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-keyinit', '', d)}"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 64/66] lttng-ust: upgrade 2.13.8 -> 2.13.10
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (62 preceding siblings ...)
2026-04-24 20:56 ` [OE-core][scarthgap 63/66] sudo: upgrade 1.9.17p1 -> 1.9.17p2 Yoann Congal
@ 2026-04-24 20:56 ` Yoann Congal
2026-04-24 20:56 ` [OE-core][scarthgap 65/66] libatomic-ops: upgrade 7.8.2 -> 7.8.4 Yoann Congal
2026-04-24 20:56 ` [OE-core][scarthgap 66/66] liburcu: upgrade 0.14.0 -> 0.14.2 Yoann Congal
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:56 UTC (permalink / raw)
To: openembedded-core
From: Daniel Turull <daniel.turull@ericsson.com>
Changelog for lttng-ust: 2.13.8 -> 2.13.10
============================================================
2026-02-13 lttng-ust 2.13.10
* Fix: ustctl: sigbus handling: statement with no effect
2025-04-14 (National Gardening Day) lttng-ust 2.13.9
* Fix: Use UATOMIC_HAS_ATOMIC_{BYTE,SHORT} for counter atomics
* Fix: lttng-ust-tp regex warnings
* lttng-ust-java: Load lttng-ust-context-jni before other JNI libraries
* doc/examples: set minimal CMake version to 3.5.0
* Fix: Update get_mempolicy check to handle EPERM
* Fix: Correct numa_available return code checks
* Fix: test_benchmark: do not match CPU(s) scaling MHz:
* Tests: Fix abi conflict test when building with clang
* Fix: Build examples when rpath is stripped from in-build-tree libs
* ust-fd: Add close_range declaration
* docs: Correct GitHub URLs in lttng-ust.3
* fix: handle EINTR correctly in get_cpu_mask_from_sysfs
Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
...es-when-rpath-is-stripped-from-in-bu.patch | 161 ------------------
...-common-link-with-liburcu-explicitly.patch | 3 +-
...Makefile.am-Add-install-lib-to-setup.patch | 3 +-
...tng-ust_2.13.8.bb => lttng-ust_2.13.10.bb} | 3 +-
4 files changed, 3 insertions(+), 167 deletions(-)
delete mode 100644 meta/recipes-kernel/lttng/lttng-ust/0001-Fix-Build-examples-when-rpath-is-stripped-from-in-bu.patch
rename meta/recipes-kernel/lttng/{lttng-ust_2.13.8.bb => lttng-ust_2.13.10.bb} (92%)
diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-Fix-Build-examples-when-rpath-is-stripped-from-in-bu.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-Fix-Build-examples-when-rpath-is-stripped-from-in-bu.patch
deleted file mode 100644
index 6da675fa312..00000000000
--- a/meta/recipes-kernel/lttng/lttng-ust/0001-Fix-Build-examples-when-rpath-is-stripped-from-in-bu.patch
+++ /dev/null
@@ -1,161 +0,0 @@
-From 5d10459b6b5182fcbc98240d9dace026c87a5037 Mon Sep 17 00:00:00 2001
-From: Kienan Stewart <kstewart@efficios.com>
-Date: Mon, 5 Aug 2024 15:41:34 -0400
-Subject: [PATCH] Fix: Build examples when rpath is stripped from in-build-tree
- libs
-
-Observed issue
-==============
-
-Certain tool chains[1, 2] emit warnings or errors when building the
-example applications.
-
-```
-make[3]: Entering directory
-'/home/xxx/src/efficios/lttng/master/src/lttng-ust/doc/examples/easy-ust'
-CC sample.o
-CC tp.o
-CCLD sample
-
-/usr/bin/ld: warning: liblttng-ust-common.so.1, needed by ../../../src/lib/lttng-ust/.libs/liblttng-ust.so, not found (try using -rpath or -rpath-link)
-/usr/bin/ld: warning: liblttng-ust-tracepoint.so.1, needed by ../../../src/lib/lttng-ust/.libs/liblttng-ust.so, not found (try using -rpath or -rpath-link)
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_add_fd_to_tracker'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_after_fork_child'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_common_ctor'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_tp_init'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_tp_probe_register_queue_release'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_cancelstate_disable_pop'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_synchronize_rcu'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_register_thread'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_tp_probe_prune_release_queue'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_cancelstate_disable_push'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_before_fork'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_lock_fd_tracker'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_trace_clock'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_has_sys_membarrier'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_unlock_fd_tracker'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_tp_exit'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_get_cpu_sym'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_common_alloc_tls'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_after_fork_parent'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_delete_fd_from_tracker'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_register'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_reader'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_gp'
-/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_tp_probe_unregister_queue_release'
-collect2: error: ld returned 1 exit status
-```
-
-=== Reproducer ===
-
-The easiest way to consistently reproduce this type of build failure
-is to perform the following steps:
-
-```
-./configure
-make -j$(nproc)
-find . -iname '*.so' -exec chrpath -d {} \;
-make -C doc/examples clean
-make -j$(nproc)
-```
-
-As the examples are not built with libtool, finding the libraries to
-link against depends on the shared objects having an rpath.
-
-E.g.
-
-```
-$ chrpath src/lib/lttng-ust/.libs/liblttng-ust.so.1.0.0
-src/lib/lttng-ust/.libs/liblttng-ust.so.1.0.0: RUNPATH=/home/xxx/src/efficios/lttng/master/src/lttng-ust/src/lib/lttng-ust-common/.libs:/home/xxx/src/efficios/lttng/master/src/lttng-ust/src/lib/lttng-ust-tracepoint/.libs:/home/xxx/src/efficios/lttng/master/usr/lib
-```
-
-The current examples build with `-Wl,-rpath` for `liblttng-ust`, but
-not the dependencies of `liblttng-ust` (which would normally be found
-via it's own rpath). If the `rpath` is stripped from
-`liblttng-ust.so`, or if the tool chain ignores `rpath` explicitly,
-then the build with fail.
-
-In the case of a yocto build environment as in GitHub#61[1], the
-following commands reproduced the warnings and the errors seen in the
-above test case.
-
-```
-git clone git://git.yoctoproject.org/poky && cd poky/
-. oe-init-build-env
-echo "PACKAGECONFIG:pn-lttng-ust = 'examples'" >>conf/local.conf
-bitbake lttng-ust
-```
-
-=== Solution ===
-
-Explicitly add library search paths and set linker rpath-link are set
-for both the standard and cmake examples. Similar changes were
-proposed for each of those parts respectively in GitHub#61[1] and GitHub#63[2].
-
-=== Known issues ===
-
-While the `rpath-link` for the second order library dependencies will
-allow the builds to complete, the examples will not work at
-runtime even when using `rpath`. From `man ld.so`, the rpaths in an
-executable or shared object are only considered for direct
-dependencies. Therefore, without setting `LD_LIBRARY_PATH` or
-installing the libraries test applications will fail as follows:
-
-```
-$ ./doc/examples/easy-ust/sample
-./doc/examples/easy-ust/sample: error while loading shared libraries: liblttng-ust-common.so.1: cannot open shared object file: No such file or directory
-```
-
-References
-==========
-
-[1]: https://github.com/lttng/lttng-ust/pull/61
-[2]: https://github.com/lttng/lttng-ust/pull/63
-
-Change-Id: I273ccddd0d0b7a1b57b9e09ddf48d8b5b41e6f8e
-Signed-off-by: Kienan Stewart <kstewart@efficios.com>
-Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
-
-Upstream-Status: Backport [https://github.com/lttng/lttng-ust/commit/5d10459b6b5182fcbc98240d9dace026c87a5037]
-Signed-off-by: Bin Lan <bin.lan.cn@windriver.com>
-
----
- doc/examples/Makefile.am | 13 ++++++++++---
- 1 file changed, 10 insertions(+), 3 deletions(-)
-
-diff --git a/doc/examples/Makefile.am b/doc/examples/Makefile.am
-index aebf63bd..79766ec0 100644
---- a/doc/examples/Makefile.am
-+++ b/doc/examples/Makefile.am
-@@ -169,7 +169,10 @@ all-local:
- CFLAGS='$(CFLAGS)' \
- AM_CFLAGS='$(AM_CFLAGS)' \
- LDFLAGS="$(LDFLAGS)" \
-- AM_LDFLAGS='$(AM_LDFLAGS) -L../../../src/lib/lttng-ust/.libs -Wl,-rpath="$(PWD)/../../src/lib/lttng-ust/.libs/" -Wl,-rpath-link="$(PWD)/../../src/lib/lttng-ust/.libs/"' \
-+ AM_LDFLAGS='$(AM_LDFLAGS) -L../../../src/lib/lttng-ust/.libs -L../../../src/lib/lttng-ust-common/.libs -L../../../src/lib/lttng-ust-tracepoint/.libs \
-+ -Wl,-rpath="$(abs_top_builddir)/src/lib/lttng-ust/.libs/" \
-+ -Wl,-rpath-link="$(abs_top_builddir)/src/lib/lttng-ust-common/.libs/" \
-+ -Wl,-rpath-link="$(abs_top_builddir)/src/lib/lttng-ust-tracepoint/.libs/"' \
- LTTNG_GEN_TP_PATH="$$rel_src_subdir$(top_srcdir)/tools/" \
- AM_V_P="$(AM_V_P)" \
- AM_V_at="$(AM_V_at)" \
-@@ -222,10 +225,14 @@ all-local:
- CXX="$(CXX)" \
- $(CMAKE) \
- -DCMAKE_INCLUDE_PATH="$(abs_top_srcdir)/include;$(abs_top_builddir)/include" \
-- -DCMAKE_LIBRARY_PATH="$(abs_top_builddir)/src/lib/lttng-ust/.libs" \
-+ -DCMAKE_LIBRARY_PATH="$(abs_top_builddir)/src/lib/lttng-ust/.libs;$(abs_top_builddir)/src/lib/lttng-ust-common/.libs;$(abs_top_builddir)/src/lib/lttng-ust-tracepoint/.libs" \
- -DCMAKE_C_FLAGS="$(AM_CFLAGS) $(CPPFLAGS) $(CFLAGS)" \
- -DCMAKE_CXX_FLAGS="$(AM_CXXFLAGS) $(CXXFLAGS) $(CPPFLAGS)" \
-- -DCMAKE_EXE_LINKER_FLAGS="$(AM_LDFLAGS) $(LDFLAGS)" \
-+ -DCMAKE_EXE_LINKER_FLAGS="$(AM_LDFLAGS) $(LDFLAGS) \
-+ -L../../../src/lib/lttng-ust/.libs -L../../../src/lib/lttng-ust-common/.libs -L../../../src/lib/lttng-ust-tracepoint/.libs \
-+ -Wl,-rpath=$(abs_top_builddir)/src/lib/lttng-ust/.libs/ \
-+ -Wl,-rpath-link=$(abs_top_builddir)/src/lib/lttng-ust-common/.libs/ \
-+ -Wl,-rpath-link=$(abs_top_builddir)/src/lib/lttng-ust-tracepoint/.libs/" \
- .. && \
- $(MAKE) \
- ) || exit 1; \
---
-2.43.0
-
diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch
index e85dbdb4398..2d1c6135a58 100644
--- a/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch
+++ b/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch
@@ -1,4 +1,4 @@
-From 27402453f25fbdb5a9fb1a1b88d1c4d9852187d2 Mon Sep 17 00:00:00 2001
+From 0755d1c25e1fd1d8f7baa863ed6a9b931c2d0095 Mon Sep 17 00:00:00 2001
From: Alexander Kanavin <alex@linutronix.de>
Date: Sun, 5 Sep 2021 10:44:19 +0200
Subject: [PATCH] lttng-ust-common: link with liburcu explicitly
@@ -7,7 +7,6 @@ Otherwise linking errors are seen on x86-32.
Upstream-Status: Submitted [by email to lttng-dev, Francis, Jonathan]
Signed-off-by: Alexander Kanavin <alex@linutronix.de>
-
---
src/lib/lttng-ust-common/Makefile.am | 1 +
1 file changed, 1 insertion(+)
diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch
index 7c49583e0dc..f9b1d198a12 100644
--- a/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch
+++ b/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch
@@ -1,4 +1,4 @@
-From f65efd963e52de51d35e2e03fb773f33dd64f565 Mon Sep 17 00:00:00 2001
+From 74bb718d64a120af79bf1068d1c6ad9e568fc58f Mon Sep 17 00:00:00 2001
From: Richard Purdie <richard.purdie@linuxfoundation.org>
Date: Tue, 20 Feb 2024 12:19:06 +0000
Subject: [PATCH] python-lttngust/Makefile.am: Add --install-lib to setup.py
@@ -9,7 +9,6 @@ building.
Upstream-Status: Submitted [https://github.com/lttng/lttng-ust/pull/59]
Signed-off-by: Robert Yang <liezhi.yang@windriver.com>
-
---
src/python-lttngust/Makefile.am | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/meta/recipes-kernel/lttng/lttng-ust_2.13.8.bb b/meta/recipes-kernel/lttng/lttng-ust_2.13.10.bb
similarity index 92%
rename from meta/recipes-kernel/lttng/lttng-ust_2.13.8.bb
rename to meta/recipes-kernel/lttng/lttng-ust_2.13.10.bb
index bf2524bdc0d..56f3d93724d 100644
--- a/meta/recipes-kernel/lttng/lttng-ust_2.13.8.bb
+++ b/meta/recipes-kernel/lttng/lttng-ust_2.13.10.bb
@@ -31,10 +31,9 @@ PE = "2"
SRC_URI = "https://lttng.org/files/lttng-ust/lttng-ust-${PV}.tar.bz2 \
file://0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch \
file://0001-lttng-ust-common-link-with-liburcu-explicitly.patch \
- file://0001-Fix-Build-examples-when-rpath-is-stripped-from-in-bu.patch \
"
-SRC_URI[sha256sum] = "d4ef98dab9a37ad4f524ccafdfd50af4f266039b528dd5afabce78e49024d937"
+SRC_URI[sha256sum] = "c997d4efa02ed18b4976a0a280ff1c7fb2fc9d6ef2f86a0f5ccb44294a9d6045"
CVE_PRODUCT = "ust"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 65/66] libatomic-ops: upgrade 7.8.2 -> 7.8.4
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (63 preceding siblings ...)
2026-04-24 20:56 ` [OE-core][scarthgap 64/66] lttng-ust: upgrade 2.13.8 -> 2.13.10 Yoann Congal
@ 2026-04-24 20:56 ` Yoann Congal
2026-04-24 20:56 ` [OE-core][scarthgap 66/66] liburcu: upgrade 0.14.0 -> 0.14.2 Yoann Congal
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:56 UTC (permalink / raw)
To: openembedded-core
From: Daniel Turull <daniel.turull@ericsson.com>
Changelog for libatomic-ops: 7.8.2 -> 7.8.4
============================================================
== [7.8.4] 2025-09-05 ==
* Document Win32-specific AO_NO_ASM_XADD macro in README
* Eliminate 'atomic_thread_fence is unsupported with tsan' gcc-11 warning
* Eliminate 'munmap argument 1 from incompatible pointer type' gcc warning
* Eliminate 'uninitialized memory use' gcc-13 warning in test_atomic
* Fix all broken URLs in comments
* Fix atomic_ops_sysdeps.S compilation for SunPro compiler in CMake script
* Update URLs after repository transfer to bdwgc organization
* Update CMake minimum required version to 3.10
Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
(cherry picked from commit 02d66279071cbd043474dc44f44d348ec3228583)
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../{libatomic-ops_7.8.2.bb => libatomic-ops_7.8.4.bb} | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-support/libatomic-ops/{libatomic-ops_7.8.2.bb => libatomic-ops_7.8.4.bb} (89%)
diff --git a/meta/recipes-support/libatomic-ops/libatomic-ops_7.8.2.bb b/meta/recipes-support/libatomic-ops/libatomic-ops_7.8.4.bb
similarity index 89%
rename from meta/recipes-support/libatomic-ops/libatomic-ops_7.8.2.bb
rename to meta/recipes-support/libatomic-ops/libatomic-ops_7.8.4.bb
index 62691334087..d0bb11eb5d7 100644
--- a/meta/recipes-support/libatomic-ops/libatomic-ops_7.8.2.bb
+++ b/meta/recipes-support/libatomic-ops/libatomic-ops_7.8.4.bb
@@ -11,7 +11,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263 \
SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/libatomic_ops-${PV}.tar.gz"
GITHUB_BASE_URI = "https://github.com/bdwgc/libatomic_ops/releases"
-SRC_URI[sha256sum] = "d305207fe207f2b3fb5cb4c019da12b44ce3fcbc593dfd5080d867b1a2419b51"
+SRC_URI[sha256sum] = "2356e002e80ef695875e971d6a4fd8c61ca5c6fa4fd1bf31cce54a269c8bfcd5"
S = "${WORKDIR}/libatomic_ops-${PV}"
^ permalink raw reply related [flat|nested] 69+ messages in thread* [OE-core][scarthgap 66/66] liburcu: upgrade 0.14.0 -> 0.14.2
2026-04-24 20:54 [OE-core][scarthgap 00/66] Patch review Yoann Congal
` (64 preceding siblings ...)
2026-04-24 20:56 ` [OE-core][scarthgap 65/66] libatomic-ops: upgrade 7.8.2 -> 7.8.4 Yoann Congal
@ 2026-04-24 20:56 ` Yoann Congal
65 siblings, 0 replies; 69+ messages in thread
From: Yoann Congal @ 2026-04-24 20:56 UTC (permalink / raw)
To: openembedded-core
From: Daniel Turull <daniel.turull@ericsson.com>
Changelog for liburcu: 0.14.0 -> 0.14.2
============================================================
2026-01-26 Userspace RCU 0.14.2
* Fix: Only include linux/time_types.h when __NR_futex_time64 is defined
* Use __NR_futex_time64 in futex syscall wrapper
* Cleanup: Remove useless declarations from urcu-qsbr
* src/urcu-bp.c: assert => urcu_posix_assert
2024-08-28 Userspace RCU 0.14.1
* Fix: missing typename in URCU_FORCE_CAST
* Allow building with GCC >= 13.3 on RISC-V
* pointer.h: Fix the rcu_cmpxchg_pointer documentation
* Adjust shell script to allow Bash in other locations
* fix: handle EINTR correctly in get_cpu_mask_from_sysfs
* Relicense src/compat-smp.h to MIT
* ppc.h: use mftb on ppc
* Fix: allow clang to build liburcu on RISC-V
* Fix -Walloc-size
* urcu/uatomic/riscv: Mark RISC-V as broken
* Fix: urcu-bp: misaligned reader accesses
* LoongArch: Document that byte and short atomics are implemented with LL/SC
* Add LoongArch support
* tests/regression/rcutorture: Add wait state
* urcu-wait: Initialize node in URCU_WAIT_NODE_INIT
* Fix: urcu-wait: add missing futex.h include
* Adjust shell scripts to allow Bash in other locations
* Add support for OpenBSD
* Revert compiler.h: Introduce caa_unqual_scalar_typeof
* rculfhash: Use caa_container_of_check_null in cds_lfht_entry
* compiler.h: Introduce caa_container_of_check_null
* compiler.h: Introduce caa_unqual_scalar_typeof
* Avoid calling caa_container_of on NULL pointer in cds_lfht macros
* Fix: revise urcu_read_lock_update() comment
* Fix: uatomic powerpc comment about lwsync
* fix: aarch64: allow RHEL7 gcc 4.8.5-11
* fix: warning 'noreturn' function does return on ppc
* Fix: use __noreturn__ for C11-compatibility
Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
---
.../liburcu/{liburcu_0.14.0.bb => liburcu_0.14.2.bb} | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
rename meta/recipes-support/liburcu/{liburcu_0.14.0.bb => liburcu_0.14.2.bb} (91%)
diff --git a/meta/recipes-support/liburcu/liburcu_0.14.0.bb b/meta/recipes-support/liburcu/liburcu_0.14.2.bb
similarity index 91%
rename from meta/recipes-support/liburcu/liburcu_0.14.0.bb
rename to meta/recipes-support/liburcu/liburcu_0.14.2.bb
index f03c9906326..12916dd0c3d 100644
--- a/meta/recipes-support/liburcu/liburcu_0.14.0.bb
+++ b/meta/recipes-support/liburcu/liburcu_0.14.2.bb
@@ -12,7 +12,7 @@ LIC_FILES_CHKSUM = "file://LICENSE;md5=e548d28737289d75a8f1e01ba2fd7825 \
SRC_URI = "http://lttng.org/files/urcu/userspace-rcu-${PV}.tar.bz2"
-SRC_URI[sha256sum] = "ca43bf261d4d392cff20dfae440836603bf009fce24fdc9b2697d837a2239d4f"
+SRC_URI[sha256sum] = "1337c49658367ca6df3c09a7c02303f752e2d964aa98518f4593f7781ad7aac2"
S = "${WORKDIR}/userspace-rcu-${PV}"
inherit autotools multilib_header
^ permalink raw reply related [flat|nested] 69+ messages in thread